Yu, "High-speed constant-time division module for Elliptic Curve Cryptography
based on GF(2m)", in IEEE Int.
There elliptic curve cryptography
(ECC) is compared to RSA on 8-bit Atmel ATmega128 processor clocked at 8 MHz.
government's National Security Agency (NSA), Certicom technologies for Elliptic Curve Cryptography
(ECC) provide the most security per bit of any known public-key scheme, making it ideal for resource-constrained environments.
Certicom's experience with security for constrained environments and Elliptic Curve Cryptography
(ECC), a computationally efficient public key technology, ensures that movianVPN has negligible impact on performance or battery life.
A spokesperson for Sun has said that in the year 2010 the company believes that elliptic curve cryptography
will be widely used.
As part of the agreement, Diversinet has licensed RSA BSAFE Crypto-C security software and intends to integrate it into the Diversinet wireless messaging product set, replacing core elements of its current Elliptic Curve Cryptography
(ECC) implementation with RSA Security technology.
The Dragon-QT provides a wide range of services, including public key cryptography, elliptic curve cryptography
, encryption, hashing, authentication, random number generation, and hands-off key management.
Among the topics are hardware design issues in elliptic curve cryptography
, a security enhancement layer for Bluetooth, and binary algorithms for multiplicative inversion.
These features support a variety of both public- and secret-key cryptography algorithms including RSA, DES, AES and Elliptic Curve Cryptography