Exploring ECC Implementation on Resource-Constrained Devices
This video delves into the challenges and solutions of implementing Elliptic Curve Cryptography on devices with limited hardware resources....

Microsoft Research
114 views β’ Aug 17, 2016

About this video
The embedded security community has been looking at the ECC ever since it was introduced. Hardware designers are now challenged by limited area (15k Gates), low power budget (100uw) and sophisticated physical attacks. This talk will report the state-of-the-art ECC implementations for ultra-constrained devices. We take a passive RFID tag as our potential target. We will discuss the known techniques to realize ECC on such kind of devices, and what are the challenges we face now and in the near future.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
114
Likes
1
Duration
52:10
Published
Aug 17, 2016
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now