A tiny coprocessor for elliptic curve cryptography over the 256-bit NIST prime field

Jeroen Bosmans, Sujoy Sinha Roy, Kimmo Jarvinen, Ingrid Verbauwhede

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)
241 Downloads (Pure)


Elliptic curve cryptography (ECC) over prime fields offers a wide range of portability since the underlying arithmetic operations that are performed over integers can be supported by general purpose computing devices. This portability helps in designing various ECC based public key protocols. However implementation of a fast enough ECC in tiny electronic devices such as RFID tags, sensor nodes, smart cards etc., is a very challenging design problem since such devices are very limited in terms of resources. In this paper we design the first lightweight ECC architecture over the NIST recommended 256-bit prime field, corresponding to a medium security level of 128-bits. The ECC architecture works as a coprocessor of a 16-bit microcontroller in a memory-mapped configuration. The architecture uses an area of only 5,933 GE on a 130 nm CMOS technology, and needs roughly 6 million clock cycles to calculate a scalar multiplication.

Original languageEnglish
Title of host publication2016 29th International Conference on VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID)
PublisherIEEE Computer Society
Number of pages6
ISBN (Electronic)9781467387002
Publication statusPublished - 17 Mar 2016
Event29th International Conference on VLSI Design, VLSID 2016 - Kolkata, India
Duration: 4 Jan 20168 Jan 2016

Publication series

NameVLSI Design, International Conference on
ISSN (Electronic)2380-6923


Conference29th International Conference on VLSI Design, VLSID 2016


  • ASIC
  • ECC Processor
  • Elliptic Curve Cryptography
  • Lightweight
  • Prime Field

ASJC Scopus subject areas

  • Hardware and Architecture
  • Electrical and Electronic Engineering


Dive into the research topics of 'A tiny coprocessor for elliptic curve cryptography over the 256-bit NIST prime field'. Together they form a unique fingerprint.

Cite this