Low Energy ASIC Elliptic Curve Processor

被引:1
作者
Keller, Maurice [1 ]
Marnane, William P. [1 ]
机构
[1] Univ Coll Cork, Dept Elect & Elect Engn, Cork, Ireland
关键词
Elliptic Curve Cryptography; Low Energy; ASIC; Characteristic 2Finite Field;
D O I
10.1166/jolpe.2009.1007
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Elliptic curve cryptography is highly suited for implementation in resource constrained environments, however, dedicated hardware accelerators are necessary to provide the low power/energy security required in small, battery powered devices. This paper presents a low energy ASIC implementation of a characteristic 2elliptic curve processor which consumes minimal energy per point multiplication, thereby prolonging battery life in constrained devices. Energy consumption is minimised by using low power design techniques in conjunction with an efficient, low area architecture in order to reduce the power consumption while maintaining a low number of clock cycles per operation. The energy/power/area trade-off is explored. In 0.13 mu m CMOS technology the architecture consumes a minimum of 1.32 mu J at 500 kHz using a digit size of 15 and 24.6 kgates. The best area/energy trade off was 1.43 mu J at 500 kHz using a digit size of 11 and 22.3 kgates.
引用
收藏
页码:85 / 95
页数:11
相关论文
共 13 条
[1]   Public-key cryptography on the top of a needle [J].
Batina, Lejla ;
Mentens, Nele ;
Sakiyarna, Kazuo ;
Preneel, Bart ;
Verbauwhede, Ingrid .
2007 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, 2007, :1831-1834
[2]  
Batina L, 2006, LECT NOTES COMPUT SC, V4357, P6
[3]  
BLAKE IF, 1999, LONDON MATH SOC LECT, V265
[4]  
IEEE-SA Standards Board, 2000, 13632000 IEEE
[5]  
Itoh T., 1986, J SOC ELECT COMMUNIC, V44, P31
[6]  
Keller M, 2007, LECT NOTES COMPUT SC, V4644, P310
[7]  
KUMAR S., 2006, P WORKSH RFID SEC
[8]  
Lopez J, 1999, LECT NOTES COMPUT SC, V1717, P316
[9]   Unleashing public-key cryptography in wireless sensor networks [J].
Lopez, Javier .
JOURNAL OF COMPUTER SECURITY, 2006, 14 (05) :469-482
[10]  
MONTGOMERY PL, 1987, MATH COMPUT, V48, P243, DOI 10.1090/S0025-5718-1987-0866113-7