{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:37:48Z","timestamp":1764239868927,"version":"build-2065373602"},"reference-count":30,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2014,9,26]],"date-time":"2014-09-26T00:00:00Z","timestamp":1411689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Radio Frequency Identification (RFID) is an important technique for wireless sensor networks and the Internet of Things. Recently, considerable research has been performed in the combination of public key cryptography and RFID. In this paper, an efficient architecture of Elliptic Curve Cryptography (ECC) Processor for RFID tag chip is presented. We adopt a new inversion algorithm which requires fewer registers to store variables than the traditional schemes. A new method for coordinate swapping is proposed, which can reduce the complexity of the controller and shorten the time of iterative calculation effectively. A modified circular shift register architecture is presented in this paper, which is an effective way to reduce the area of register files. Clock gating and asynchronous counter are exploited to reduce the power consumption. The simulation and synthesis results show that the time needed for one elliptic curve scalar point multiplication over GF(2163) is  176.7 K clock cycles and the gate area is 13.8 K with UMC 0.13 \u03bcm Complementary Metal Oxide Semiconductor (CMOS) technology. Moreover, the low power and low cost consumption make the Elliptic Curve Cryptography Processor (ECP) a prospective candidate for application in the RFID tag chip.<\/jats:p>","DOI":"10.3390\/s141017883","type":"journal-article","created":{"date-parts":[[2014,9,26]],"date-time":"2014-09-26T11:27:58Z","timestamp":1411730878000},"page":"17883-17904","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Design of an Elliptic Curve Cryptography Processor for RFID Tag Chips"],"prefix":"10.3390","volume":"14","author":[{"given":"Zilong","family":"Liu","sequence":"first","affiliation":[{"name":"School of Optical and Electronic Information, Huazhong University of Science and Technology, Wuhan 430074, China"}]},{"given":"Dongsheng","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Optical and Electronic Information, Huazhong University of Science and Technology, Wuhan 430074, China"}]},{"given":"Xuecheng","family":"Zou","sequence":"additional","affiliation":[{"name":"School of Optical and Electronic Information, Huazhong University of Science and Technology, Wuhan 430074, China"}]},{"given":"Hui","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Science, Wuhan University of Technology, Wuhan 430074, China"}]},{"given":"Jian","family":"Cheng","sequence":"additional","affiliation":[{"name":"School of Optical and Electronic Information, Huazhong University of Science and Technology, Wuhan 430074, China"}]}],"member":"1968","published-online":{"date-parts":[[2014,9,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The internet of things: A survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Comput. Netw."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Koblitz, N. (1987). Elliptic curve cryptosystems. Math. Comput., 203\u2013220.","DOI":"10.2307\/2007884"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1023\/A:1008354106356","article-title":"The state of elliptic curve cryptography","volume":"19","author":"Koblitz","year":"2000","journal-title":"Des. Codes Cryptogr."},{"key":"ref_4","unstructured":"National Security Agency The Case for Elliptic Curve Cryptography. Available online: http:\/\/www.nsa.gov\/business\/programs\/elliptic_curve.shtml."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"2330","DOI":"10.1109\/TVLSI.2012.2230410","article-title":"Novel architecture for efficient FPGA implementation of elliptic curve cryptographic Processor over GF(2163)","volume":"21","author":"Mahdizadeh","year":"2013","journal-title":"IEEE Trans. Very Large Scale Integr."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1109\/TIE.2012.2186104","article-title":"Efficient elliptic curve point multiplication using digit-serial binary field operation","volume":"60","author":"Gustavo","year":"2013","journal-title":"IEEE Trans. Ind. Electron."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/j.vlsi.2010.08.001","article-title":"Optimized FPGA-based elliptic curve cryptography processor for high-speed applications","volume":"44","year":"2011","journal-title":"Integr. VLSI J."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1469","DOI":"10.1109\/TC.2008.65","article-title":"Provably sublinear point multiplication on Koblitz curves and its hardware implementation","volume":"57","author":"Dimitrov","year":"2008","journal-title":"IEEE Trans. Comput."},{"key":"ref_9","first-page":"41","article-title":"High-Performance implementation of point multiplication on Koblitz curves","volume":"60","author":"Azarderakhsh","year":"2013","journal-title":"IEEE Trans. Circuits Syst. II Exp. Briefs."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1514","DOI":"10.1109\/TC.2008.148","article-title":"Elliptic-curve-based security processor for RFID","volume":"57","author":"Lee","year":"2008","journal-title":"IEEE Trans. Comput."},{"key":"ref_11","unstructured":"Kumar, S., and Paar, C. (2006, January 12\u201314). Are standards compliant elliptic curve cryptosystems feasible on RFID?. Graz, Austria."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Kocabas, U., Fan, J., and Verbauwhede, I. (2010, January 7\u20139). Implementation of binary Edwards curves for very-constrained devices. Rennes, France.","DOI":"10.1109\/ASAP.2010.5541003"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/978-3-642-04159-4_26","article-title":"ECC is Ready for RFID-A Proof in Silicon","volume":"Volume 5381","author":"Roberto","year":"2009","journal-title":"Selected Areas in Cryptography"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1185","DOI":"10.1049\/el.2012.1767","article-title":"Area-Efficient and ultra-low-power architecture of RSA Processor for RFID","volume":"48","author":"Wang","year":"2012","journal-title":"Electron. Lett."},{"key":"ref_15","first-page":"516","article-title":"RFID Technology Based Attendance Management System","volume":"10","author":"Nainan","year":"2013","journal-title":"Int. J. Comput. Sci. Issue"},{"key":"ref_16","unstructured":"Menezes, A., Oorschot, A.V., and Vanstone, S. (1997). Handbook of Applied Cryptography, CRC Press Inc."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","article-title":"Speeding the pollard and elliptic curve method of factorization","volume":"48","author":"Montgomery","year":"1987","journal-title":"Math. Comput."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1007\/3-540-48059-5_27","article-title":"Fast Multiplication on elliptic curves over GF(2m) without precomputation","volume":"Volume 1717","author":"Cetin","year":"1999","journal-title":"Cryptographic Hardware and Embedded Systems"},{"key":"ref_19","first-page":"291","article-title":"The Montgomery Powering Ladder","volume":"Volume 2523","author":"Burton","year":"2002","journal-title":"Cryptographic Hardware and Embedded Systems"},{"key":"ref_20","unstructured":"Burton, D.M. (2006). Elementary Number Theory, Tata McGraw-Hill Education."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/0890-5401(88)90024-7","article-title":"A fast algorithm for computing multiplicative inverses in GF(2m) using normal bases","volume":"78","author":"Itoh","year":"1988","journal-title":"Inf. Comput."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Dimitrov, V., and J\u00e4rvinen, K. (2013, January 7\u201310). Another look at inversions over binary fields. Austin, TX, USA.","DOI":"10.1109\/ARITH.2013.25"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1144","DOI":"10.1109\/TCSI.2013.2283691","article-title":"Efficient algorithm and architecture for elliptic curve cryptography for extremely constrained secure applications","volume":"61","author":"Reza","year":"2014","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1109\/81.841927","article-title":"Clock-Gating and its application to low power design of sequential circuits","volume":"47","author":"Wu","year":"2000","journal-title":"IEEE Trans. Circuits Syst. I Fundam. Theory Appl."},{"key":"ref_25","unstructured":"Wei, D., Zhang, C., Cui, Y., Chen, H., and Wang, Z. (15, January 20\u201323). Design of a low-cost low-power baseband-processor for UHF RFID tag with asynchronous design technique. Seoul, Korea."},{"key":"ref_26","unstructured":"Identification Cards\u2014Contactless Integrated Circuit(s) Cards\u2014Proximity Cards, Part 1: Physical Characteristics, ISO\/IEC 14443-1, December 1999."},{"key":"ref_27","unstructured":"Ferreira, J., Filipe, P., Cunha, G., and Silva, J. (2013, January 27\u201331). Cloud terminals for ticketing systems. Valencia, Spain."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Markantonakis, K., Mayes, K., Sauveron, D., and Askoxylakis, I.G. (2008, January 22\u201324). Overview of security threats for smart cards in the public transport industry. Xi'an, China.","DOI":"10.1109\/ICEBE.2008.91"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s102070100002","article-title":"The elliptic curve digital signature algorithm (ECDSA)","volume":"1","author":"Johnson","year":"2001","journal-title":"Int. J. Inf. Secur."},{"key":"ref_30","unstructured":"National Institute of Standards and Technology Recommended Elliptic Curves for Federal Government Use. Available online: http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/documents\/dss\/NISTReCur.pdf."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/14\/10\/17883\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T21:16:20Z","timestamp":1760217380000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/14\/10\/17883"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,26]]},"references-count":30,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2014,10]]}},"alternative-id":["s141017883"],"URL":"https:\/\/doi.org\/10.3390\/s141017883","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2014,9,26]]}}}