{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T18:41:43Z","timestamp":1772563303048,"version":"3.50.1"},"reference-count":22,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T00:00:00Z","timestamp":1652140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001863","name":"New Energy and Industrial Technology Development Organization (NEDO)","doi-asserted-by":"publisher","award":["JPNP16007"],"award-info":[{"award-number":["JPNP16007"]}],"id":[{"id":"10.13039\/501100001863","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>In cryptography, elliptic curve cryptography (ECC) is considered an efficient and secure method to implement digital signature algorithms (DSAs). ECC plays an essential role in many security applications, such as transport layer security (TLS), internet protocol security (IPsec), and wireless sensor networks (WSNs). The proposed designs of ECC hardware implementation only focus on a single ECC variant and use many resources. These proposals cannot be used for resource-constrained applications or for the devices that need to provide multiple levels of security. This work provides a multi-functional elliptic curve digital signature algorithm (ECDSA) and Edwards-curve digital signature algorithm (EdDSA) hardware implementation. The core can run multiple ECDSA\/EdDSA algorithms in a single design. The design consumes fewer resources than the other single-functional design, and is not based on digital signal processors (DSP). The experiments show that the proposed core could run up to 112.2 megahertz with Virtex-7 devices while consuming only 10,259 slices in total.<\/jats:p>","DOI":"10.3390\/cryptography6020025","type":"journal-article","created":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T08:31:55Z","timestamp":1652171515000},"page":"25","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA\/EdDSA"],"prefix":"10.3390","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7240-7203","authenticated-orcid":false,"given":"Binh","family":"Kieu-Do-Nguyen","sequence":"first","affiliation":[{"name":"Department of Computer and Network Engineering, The University of Electro-Communications (UEC), 1-5-1 Chofugaoka, Chofu-shi, Tokyo 182-8585, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2917-1244","authenticated-orcid":false,"given":"Cuong","family":"Pham-Quoc","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), 268 Ly Thuong Kiet St., Dist. 10, Ho Chi Minh City 740050, Vietnam"}]},{"given":"Ngoc-Thinh","family":"Tran","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), 268 Ly Thuong Kiet St., Dist. 10, Ho Chi Minh City 740050, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5255-4919","authenticated-orcid":false,"given":"Cong-Kha","family":"Pham","sequence":"additional","affiliation":[{"name":"Department of Computer and Network Engineering, The University of Electro-Communications (UEC), 1-5-1 Chofugaoka, Chofu-shi, Tokyo 182-8585, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4078-0836","authenticated-orcid":false,"given":"Trong-Thuc","family":"Hoang","sequence":"additional","affiliation":[{"name":"Department of Computer and Network Engineering, The University of Electro-Communications (UEC), 1-5-1 Chofugaoka, Chofu-shi, Tokyo 182-8585, Japan"}]}],"member":"1968","published-online":{"date-parts":[[2022,5,10]]},"reference":[{"key":"ref_1","unstructured":"(2022, March 10). The Transport Layer Security (TLS) Protocol Version 1.3. Available online: https:\/\/www.rfc-editor.org\/info\/rfc8446."},{"key":"ref_2","unstructured":"(2022, March 10). IKE and IKEv2 Authentication Using the Elliptic Curve Digital Signature Algorithm (ECDSA). Available online: https:\/\/www.rfc-editor.org\/info\/rfc4754."},{"key":"ref_3","unstructured":"(2022, March 10). IT Security Techniques\u2014Digital Signatures. Available online: https:\/\/www.iso.org\/standard\/76382.html."},{"key":"ref_4","unstructured":"(2022, March 10). Digital Signature Standard (DSS), Available online: https:\/\/csrc.nist.gov\/publications\/detail\/fips\/186\/2\/archive\/2000-01-27."},{"key":"ref_5","unstructured":"(2022, March 10). Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). Available online: https:\/\/standards.globalspec.com\/std\/1955141\/ANSI%20X9.62."},{"key":"ref_6","unstructured":"(2022, March 10). Edwards-Curve Digital Signature Algorithm (EdDSA). Available online: https:\/\/www.rfc-editor.org\/info\/rfc8032."},{"key":"ref_7","first-page":"124","article-title":"High-Speed High-Security Signatures","volume":"2","author":"Bernstein","year":"2011","journal-title":"J. Cryp. Eng."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Sghaier, A., Zeghid, M., and Machhout, M. (2017). Fast hardware implementation of ECDSA signature scheme. Proceedings of the International Symposium on Signa, Image, Video and Communications (ISIVC), Tunis, Tunisia, 21\u201323 November 2016, IEEE.","DOI":"10.1109\/ISIVC.2016.7894012"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Sghaier, A., Zeghid, M., Massoud, C., and Mahchout, M. (2017). Design And Implementation of Low Area\/Power Elliptic Curve Digital Signature Hardware Core. Electronics, 6.","DOI":"10.3390\/electronics6020046"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Panjwani, B., and Mehta, D.C. (2015). Hardware-software co-design of elliptic curve digital signature algorithm over binary fields. Proceedings of the International Conference on Advances in Computing, Comm. and Informatics (ICACCI), Kochi, India, 10\u201313 August 2015, IEEE.","DOI":"10.1109\/ICACCI.2015.7275757"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Panjwani, B. (2017). Scalable and parameterized hardware implementation of elliptic curve digital signature algorithm over prime fields. Proceedings of the International Conference on Advances in Computing, Comm. and Informatics (ICACCI), Udupi, India, 13\u201316 September 2017, IEEE.","DOI":"10.1109\/ICACCI.2017.8125842"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1297","DOI":"10.1109\/TVLSI.2021.3077885","article-title":"Cryptographic Accelerators for Digital Signature Based on Ed25519","volume":"29","author":"Azarderakhsh","year":"2021","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"3854","DOI":"10.1109\/TCSI.2019.2914247","article-title":"An Efficient Low-Latency Point-Multiplication Over Curve25519","volume":"66","author":"Salarifard","year":"2019","journal-title":"IEEE Trans. Circ. Syst. I Regul. Pap."},{"key":"ref_14","first-page":"1","article-title":"Implementing Curve25519 for Side-Channel\u2013Protected Elliptic Curve Cryptography","volume":"9","author":"Sasdrich","year":"2015","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3312742","article-title":"Compact and Flexible FPGA Implementation of Ed25519 and X25519","volume":"18","author":"Turan","year":"2019","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1049\/iet-cdt.2016.0141","article-title":"High-throughput multi-key elliptic curve cryptosystem based on residue number system","volume":"5","author":"Asif","year":"2017","journal-title":"IET Comp. Dig. Tech."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"178811","DOI":"10.1109\/ACCESS.2019.2958491","article-title":"FPGA Implementation of High-Speed Area-Efficient Processor for Elliptic Curve Point Multiplication Over Prime Field","volume":"7","author":"Islam","year":"2019","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Kodali, R.K. (2014). Implementation of ECDSA in WSN. Proceedings of the International Conference on Control Communication and Computing (ICCC), Thiruvananthapuram, India, 13\u201315 December 2013, IEEE.","DOI":"10.1109\/ICCC.2013.6731670"},{"key":"ref_19","first-page":"8392080","article-title":"A Compatible OpenFlow Platform for Enabling Security Enhancement SDN","volume":"2018","author":"Cheng","year":"2018","journal-title":"Sec. Commun. Netw."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"van Tilborg, H.C.A. (2005). Binary Euclidean Algorithm. Encyclopedia of Cryptography and Security, Springer.","DOI":"10.1007\/0-387-23483-7"},{"key":"ref_21","unstructured":"Goehringer, D., Santambrogio, M.D., Cardoso, J.M.P., and Bertels, K. (2014). Efficient Elliptic-Curve Cryptography Using Curve25519 on Reconfigurable Devices. Proceedings of the Applied Reconfigurable Computing (ARC), Vilamoura, Portugal, 14\u201316 April 2014, Springer."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Koppermann, P., De Santis, F., Heyszl, J., and Sigl, G. (2016). X25519 Hardware Implementation for Low-Latency Applications. Proceedings of the Digital Syst. Design (DSD), Limassol, Cyprus, 31 August\u20132 September 2016, IEEE.","DOI":"10.1109\/DSD.2016.65"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/6\/2\/25\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:08:42Z","timestamp":1760137722000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/6\/2\/25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,10]]},"references-count":22,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2022,6]]}},"alternative-id":["cryptography6020025"],"URL":"https:\/\/doi.org\/10.3390\/cryptography6020025","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,10]]}}}