{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:13:59Z","timestamp":1760238839614,"version":"build-2065373602"},"reference-count":53,"publisher":"MDPI AG","issue":"18","license":[{"start":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T00:00:00Z","timestamp":1599696000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100010418","name":"Institute for Information and Communications Technology Promotion","doi-asserted-by":"publisher","award":["IITP-2018-0-01396"],"award-info":[{"award-number":["IITP-2018-0-01396"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>With the swift evolution of wireless technologies, the demand for the Internet of Things (IoT) security is rising immensely. Elliptic curve cryptography (ECC) provides an attractive solution to fulfill this demand. In recent years, Edwards curves have gained widespread acceptance in digital signatures and ECC due to their faster group operations and higher resistance against side-channel attacks (SCAs) than that of the Weierstrass form of elliptic curves. In this paper, we propose a high-speed, low-area, simple power analysis (SPA)-resistant field-programmable gate array (FPGA) implementation of ECC processor with unified point addition on a twisted Edwards curve, namely Edwards25519. Efficient hardware architectures for modular multiplication, modular inversion, unified point addition, and elliptic curve point multiplication (ECPM) are proposed. To reduce the computational complexity of ECPM, the ECPM scheme is designed in projective coordinates instead of affine coordinates. The proposed ECC processor performs 256-bit point multiplication over a prime field in 198,715 clock cycles and takes 1.9 ms with a throughput of 134.5 kbps, occupying only 6543 slices on Xilinx Virtex-7 FPGA platform. It supports high-speed public-key generation using fewer hardware resources without compromising the security level, which is a challenging requirement for IoT security.<\/jats:p>","DOI":"10.3390\/s20185148","type":"journal-article","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T09:10:09Z","timestamp":1599729009000},"page":"5148","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":40,"title":["Design and Implementation of High-Performance ECC Processor with Unified Point Addition on Twisted Edwards Curve"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9686-5994","authenticated-orcid":false,"given":"Md. Mainul","family":"Islam","sequence":"first","affiliation":[{"name":"Department of Electronics Engineering, Kookmin University, Seoul 02707, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3754-3618","authenticated-orcid":false,"given":"Md. Selim","family":"Hossain","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, Khulna University of Engineering &amp; Technology (KUET), Khulna 9203, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7773-3523","authenticated-orcid":false,"given":"Moh. Khalid","family":"Hasan","sequence":"additional","affiliation":[{"name":"Department of Electronics Engineering, Kookmin University, Seoul 02707, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4876-6860","authenticated-orcid":false,"given":"Md.","family":"Shahjalal","sequence":"additional","affiliation":[{"name":"Department of Electronics Engineering, Kookmin University, Seoul 02707, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9963-303X","authenticated-orcid":false,"given":"Yeong Min","family":"Jang","sequence":"additional","affiliation":[{"name":"Department of Electronics Engineering, Kookmin University, Seoul 02707, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2020,9,10]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"27336","DOI":"10.1109\/ACCESS.2018.2836350","article-title":"A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT","volume":"6","author":"Ding","year":"2018","journal-title":"IEEE Access"},{"key":"ref_2","unstructured":"Hankerson, D., Menezes, A., and Vanstone, S. (2004). Guide to Elliptic Curve Cryptography, Springe."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"31","author":"ElGamal","year":"1985","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_6","first-page":"237","article-title":"On emerging family of elliptic curves to secure internet of things: ECC comes of age","volume":"14","author":"Liu","year":"2017","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"3028","DOI":"10.1109\/ACCESS.2017.2676119","article-title":"Secure signature-based authenticated key establishment scheme for future IoT applications","volume":"5","author":"Challa","year":"2017","journal-title":"IEEE Access"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"72514","DOI":"10.1109\/ACCESS.2018.2881444","article-title":"Elliptic curve lightweight cryptography: A survey","volume":"6","year":"2018","journal-title":"IEEE Access"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1514","DOI":"10.1109\/TC.2008.148","article-title":"Elliptic-curve-based security processor for RFID","volume":"57","author":"Lee","year":"2008","journal-title":"IEEE Trans. Comput."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.adhoc.2013.02.004","article-title":"A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol","volume":"18","author":"Liao","year":"2014","journal-title":"Ad Hoc Netw."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/s11227-013-1073-x","article-title":"An efficient mutual authentication RFID scheme based on elliptic curve cryptography","volume":"70","author":"Chou","year":"2014","journal-title":"J. Supercomput."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s10916-014-0047-8","article-title":"An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography","volume":"38","author":"Zhang","year":"2014","journal-title":"J. Med. Syst."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s10916-014-0046-9","article-title":"A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem","volume":"38","author":"Zhao","year":"2014","journal-title":"J. Med. Syst."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/JIOT.2014.2360121","article-title":"An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography","volume":"2","author":"He","year":"2015","journal-title":"IEEE Internet Things J."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/s13389-012-0027-1","article-title":"High-speed high-security signatures","volume":"2","author":"Bernstein","year":"2012","journal-title":"J. Cryptogr. Eng."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Liusvaara, I., and Josefsson, S. (2017, January 01). Edwards Curve Digital Signature Algorithm (EdDSA). In Internet-Draft: Draft-irtf-cfrg-eddsa-05, Internet Engineering Task Force. Available online: https:\/\/tools.ietf.org\/html\/rfc8032.","DOI":"10.17487\/RFC8032"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1109\/TPDS.2013.145","article-title":"Certificateless remote anonymous authentication schemes for wireless body area networks","volume":"25","author":"Liu","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"2590","DOI":"10.1109\/JSYST.2016.2544805","article-title":"Anonymous authentication for wireless body area networks with provable security","volume":"11","author":"He","year":"2017","journal-title":"IEEE Syst. J."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"4926","DOI":"10.1109\/JIOT.2018.2876133","article-title":"Remote authentication schemes for wireless body area networks based on the Internet of Things","volume":"5","author":"Saeed","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1109\/JIOT.2014.2323395","article-title":"Securing the Internet of Things: A standardization perspective","volume":"1","author":"Keoh","year":"2014","journal-title":"IEEE Internet Things J."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1109\/TC.2016.2623609","article-title":"Elliptic curve cryptography with efficiently computable endomorphisms and its hardware implementations for the Internet of Things","volume":"66","author":"Liu","year":"2017","journal-title":"IEEE Trans. Comput."},{"key":"ref_22","first-page":"2339","article-title":"An Energy-Efficient Reconfigurable DTLS Cryptographic Engine for Securing Internet-of-Things Applications","volume":"54","author":"Banerjee","year":"2019","journal-title":"IEEE J. Comput."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"178811","DOI":"10.1109\/ACCESS.2019.2958491","article-title":"FPGA implementation of high-speed area-efficient processor for elliptic curve point multiplication over prime field","volume":"7","author":"Islam","year":"2019","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/3-540-45664-3_24","article-title":"Weierstra\u00df elliptic curves and side-channel attacks","volume":"Volume 2274","author":"Brier","year":"2002","journal-title":"Public Key Cryptography (LNCS)"},{"key":"ref_25","first-page":"17","article-title":"Elliptic curves and side-channel analysis","volume":"4","author":"Joye","year":"2003","journal-title":"ST J. Syst. Res."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1090\/S0273-0979-07-01153-6","article-title":"A normal form for elliptic curves","volume":"44","author":"Edward","year":"2007","journal-title":"Bull. Am. Math. Soc."},{"key":"ref_27","first-page":"29","article-title":"Faster addition and doubling on elliptic curves","volume":"Volume 4833","author":"Bernstein","year":"2007","journal-title":"Proceedings of the Advances in Cryptology (LNCS)"},{"key":"ref_28","first-page":"326","article-title":"Twisted edwards curves revisited","volume":"Volume 5350","author":"Hisil","year":"2008","journal-title":"Proceedings of the Advances in Cryptology (LNCS)"},{"key":"ref_29","first-page":"389","article-title":"Twisted edwards curves","volume":"Volume 5023","author":"Bernstein","year":"2008","journal-title":"Proceedings of the Advances in Cryptology (LNCS)"},{"key":"ref_30","first-page":"207","article-title":"Curve25519: New Diffie-Hellman speed records","volume":"Volume 3958","author":"Bernstein","year":"2006","journal-title":"Proceedings of the Public Key Cryptography (LNCS)"},{"key":"ref_31","first-page":"355","article-title":"A hardware analysis of twisted Edwards curves for an elliptic curve cryptosystem","volume":"Volume 5453","author":"Baldwin","year":"2009","journal-title":"Proceedings of the Reconfigurable Computing: Architectures Tools and Applications (LNCS)"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1109\/TC.2013.213","article-title":"New regular radix-8 scheme for elliptic curve scalar multiplication without pre-computation","volume":"64","author":"Abdulrahman","year":"2015","journal-title":"IEEE Trans. Comput."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"73898","DOI":"10.1109\/ACCESS.2020.2988379","article-title":"Area-time efficient hardware implementation of modular multiplication for elliptic curve cryptography","volume":"8","author":"Islam","year":"2020","journal-title":"IEEE Access"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1049\/iet-cdt.2016.0141","article-title":"High-throughput multi-key elliptic curve cryptosystem based on residue number system","volume":"11","author":"Asif","year":"2017","journal-title":"IET Comput. Digit. Tech."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1049\/iet-cdt.2016.0033","article-title":"High-performance elliptic curve cryptography processor over NIST prime fields","volume":"11","author":"Hossain","year":"2016","journal-title":"IET Comput. Digit. Tech."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1950081","DOI":"10.1142\/S0218126619500816","article-title":"Redundant signed digit based high-speed elliptic curve cryptographic processor","volume":"28","author":"Shah","year":"2018","journal-title":"J. Circuits Syst. Comput."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1109\/TVLSI.2015.2391274","article-title":"A high-speed FPGA implementation of an RSD-based ECC processor","volume":"24","author":"Marzouqi","year":"2016","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Marzouqi, H., Al-Qutayri, M., and Salah, K. (2013, January 8\u201311). An FPGA implementation of NIST 256 prime field ECC processor. Proceedings of the IEEE International Conference on Electronics, Circuits, and Systems (ICECS), Abu Dhabi, UAE.","DOI":"10.1109\/ICECS.2013.6815461"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"2353","DOI":"10.1109\/TIE.2016.2625241","article-title":"An efficient and flexible hardware implementation of the dual-field elliptic curve cryptographic processor","volume":"64","author":"Liu","year":"2017","journal-title":"IEEE Trans. Ind. Electron."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Hu, X., Zheng, X., Zhang, S., Cai, S., and Xiong, X. (2018). A low hardware consumption elliptic curve cryptographic architecture over GF(p) in embedded application. Electronics, 7.","DOI":"10.3390\/electronics7070104"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1002\/cta.2295","article-title":"Low latency flexible FPGA implementation of point multiplication on elliptic curves over GF(p)","volume":"45","author":"Javeed","year":"2016","journal-title":"Int. J. Circuit Theory Appl."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2016\/6371403","article-title":"FPGA based high-speed SPA-resistant elliptic curve scalar multiplier architecture","volume":"2016","author":"Javeed","year":"2016","journal-title":"Int. J. Reconfigurable Comput."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1016\/j.micpro.2016.12.005","article-title":"High performance hardware support for elliptic curve cryptography over general prime field","volume":"51","author":"Javeed","year":"2017","journal-title":"Microprocess. Microsyst."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.compeleceng.2008.06.009","article-title":"Parallel crypto-devices for GF(p) elliptic curve multiplication resistant against side-channel attacks","volume":"35","author":"Ghosh","year":"2009","journal-title":"Comput. Electr. Eng."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/TVLSI.2009.2019415","article-title":"Flexible hardware processor for elliptic curve cryptography over NIST prime fields","volume":"17","author":"Ananyi","year":"2009","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"2753","DOI":"10.1109\/TVLSI.2014.2375640","article-title":"Scalable elliptic curve cryptosystem FPGA processor for NIST prime curves","volume":"23","author":"Loi","year":"2015","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"ref_47","first-page":"347","article-title":"Reconfigurable modular arithmetic logic unit for high-performance public-key cryptosystems","volume":"Volume 3985","author":"Sakiyama","year":"2006","journal-title":"Proceedings of the Reconfigurable Computing: Architectures and Applications (LNCS)"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"1798","DOI":"10.1109\/TCSI.2010.2103190","article-title":"Petrel: Power and timing attack resistant elliptic curve scalar multiplier based on programmable GF(p) arithmetic unit","volume":"58","author":"Ghosh","year":"2011","journal-title":"IEEE Trans. Circuits Syst. I-Regul. Pap."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/TVLSI.2013.2237930","article-title":"Efficient power-analysis-resistant dual-field elliptic curve cryptographic processor using heterogeneous dual-processing-element architecture","volume":"22","author":"Lee","year":"2014","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"1946","DOI":"10.1109\/TCSI.2006.880184","article-title":"Hardware elliptic curve cryptographic processor over GF(p)","volume":"53","author":"Mcivor","year":"2006","journal-title":"IEEE Trans. Circuits Syst. I-Fundam. Theor. Appl."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"1567","DOI":"10.1109\/TVLSI.2008.2001239","article-title":"High-throughput cost-effective dual-field processors and the design framework for elliptic curve cryptography","volume":"16","author":"Lai","year":"2008","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"1202","DOI":"10.1109\/TCSI.2008.2008507","article-title":"An RNS implementation of an Fp elliptic curve point multiplier","volume":"56","author":"Schinianakis","year":"2009","journal-title":"IEEE Tran. Circuits Syst. I-Regul. Pap."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"1545","DOI":"10.1109\/TVLSI.2012.2210916","article-title":"Efficient RNS implementation of elliptic curve point multiplication over GF(p)","volume":"21","author":"Esmaeildoust","year":"2013","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/18\/5148\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:08:31Z","timestamp":1760177311000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/18\/5148"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,10]]},"references-count":53,"journal-issue":{"issue":"18","published-online":{"date-parts":[[2020,9]]}},"alternative-id":["s20185148"],"URL":"https:\/\/doi.org\/10.3390\/s20185148","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2020,9,10]]}}}