Exploring ECC Implementation on Resource-Constrained Devices

This video delves into the challenges and solutions of implementing Elliptic Curve Cryptography on devices with limited hardware resources....

Exploring ECC Implementation on Resource-Constrained Devices
Microsoft Research
114 views β€’ Aug 17, 2016
Exploring ECC Implementation on Resource-Constrained Devices

About this video

The embedded security community has been looking at the ECC ever since it was introduced. Hardware designers are now challenged by limited area (15k Gates), low power budget (100uw) and sophisticated physical attacks. This talk will report the state-of-the-art ECC implementations for ultra-constrained devices. We take a passive RFID tag as our potential target. We will discuss the known techniques to realize ECC on such kind of devices, and what are the challenges we face now and in the near future.

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

114

Likes

1

Duration

52:10

Published

Aug 17, 2016

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.