Yu, "High-speed constant-time division module for Elliptic Curve Cryptography
based on GF(2m)", in IEEE Int.
There elliptic curve cryptography
(ECC) is compared to RSA on 8-bit Atmel ATmega128 processor clocked at 8 MHz.
government's National Security Agency (NSA), Certicom technologies for Elliptic Curve Cryptography
(ECC) provide the most security per bit of any known public-key scheme, making it ideal for resource-constrained environments.
Freescale is using the elliptic curve cryptography
library in Mocana NanoCrypto for its ZigBee Smart Energy 2 software stack, which runs on their Kinetis MCUs, including their new KW20 wireless MCU, to quickly generate the encryption keys used to secure communications between two ZigBee nodes.
Certicom's experience with security for constrained environments and Elliptic Curve Cryptography
(ECC), a computationally efficient public key technology, ensures that movianVPN has negligible impact on performance or battery life.
A spokesperson for Sun has said that in the year 2010 the company believes that elliptic curve cryptography
will be widely used.
As part of the agreement, Diversinet has licensed RSA BSAFE Crypto-C security software and intends to integrate it into the Diversinet wireless messaging product set, replacing core elements of its current Elliptic Curve Cryptography
(ECC) implementation with RSA Security technology.
PrivateSky[TM] is powered by powerful and modern elliptic curve cryptography
delivered in simple to use and easy to adopt packaging.
The Dragon-QT provides a wide range of services, including public key cryptography, elliptic curve cryptography
, encryption, hashing, authentication, random number generation, and hands-off key management.
Among the topics are hardware design issues in elliptic curve cryptography
, a security enhancement layer for Bluetooth, and binary algorithms for multiplicative inversion.
These features support a variety of both public- and secret-key cryptography algorithms including RSA, DES, AES and Elliptic Curve Cryptography
NTRU is asymmetric cryptography that is based on a completely different mathematical problem from RSA and Elliptic Curve cryptography