<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1665-6423</journal-id>
<journal-title><![CDATA[Journal of applied research and technology]]></journal-title>
<abbrev-journal-title><![CDATA[J. appl. res. technol]]></abbrev-journal-title>
<issn>1665-6423</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Ciencias Aplicadas y Tecnología]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1665-64232024000200295</article-id>
<article-id pub-id-type="doi">10.22201/icat.24486736e.2024.22.2.2230</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Secured V2X communication using optimized prime field ECC architecture]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Kamaraj]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Mepco Schlenk Engineering College Department of Electronics and Communication Engineering ]]></institution>
<addr-line><![CDATA[Sivakasi ]]></addr-line>
<country>India</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2024</year>
</pub-date>
<volume>22</volume>
<numero>2</numero>
<fpage>295</fpage>
<lpage>307</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1665-64232024000200295&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1665-64232024000200295&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1665-64232024000200295&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: In today's world, vehicles can communicate with one another, pedestrians, roadside infrastructure, and other moving objects using the basic type of vehicular communication known as vehicle-to-everything (V2X) communication. In addition to road safety, security and privacy issues must be taken into consideration in V2X activities. The objective of this research is to ensure an important level of security in various forms of vehicular communication (V2V, V2I, and V2N) and to support vehicles in safely receiving all keys and messages from roadside unit (RSU), other vehicles, or the network with the support of simple cryptographic techniques. This research work develops Elliptic Curve Cryptography (ECC) crypto processor to achieve area efficient, high-speed ECC processor to reach the desired objective. The Koblitz curve secp256k1 is supported by the designed ECC processor for 256-bit point multiplication and point addition. Here, prime fields are incorporated to increase security. A powerful illustration of the "divide and conquer" strategy's ability to accelerate multiplication asymptotically is given by the Karatsuba algorithm. The pipeline technology accelerates multiplication process much faster. For the 256-bit prime field, the proposed pipelined Karatsuba multiplier based ECC processor is implemented on the Xilinx Virtex-7 FPGA. With a maximum clock frequency of 238.40MHz, the proposed Karatsuba-based ECC processor executes 256-bit single point multiplication in 0.937ms, providing 273.21kbps throughput, and taking up 8.42k slices in a Virtex-7 FPGA. Scalar multiplication is extended by incorporating a pipeline by increasing the highest clock frequency by up to 7.97%, which decreases time consumption by 9.90% and boosts throughput by 10.99%. In terms of area, operating frequency, area-delay product, and throughput, the suggested pipelined Karatsuba multiplier based ECC processor performs better than the existing designs.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Elliptic Curve Cryptography]]></kwd>
<kwd lng="en"><![CDATA[Point Multiplication]]></kwd>
<kwd lng="en"><![CDATA[Montgomery]]></kwd>
<kwd lng="en"><![CDATA[Left to Right algorithm]]></kwd>
<kwd lng="en"><![CDATA[Karatsuba]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Asif]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Hossain]]></surname>
<given-names><![CDATA[M. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kong]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[High&#8208;throughput multi&#8208;key elliptic curve cryptosystem based on residue number system]]></article-title>
<source><![CDATA[IET Computers &amp; Digital Techniques]]></source>
<year>2017</year>
<volume>11</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>165-72</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arunachalam]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Perumalsamy]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[FPGA implementation of time-area-efficient Elliptic Curve Cryptography for entity authentication]]></article-title>
<source><![CDATA[Informacije MIDEM]]></source>
<year>2022</year>
<volume>52</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>89-103</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Azarderakhsh]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Elkhatib]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Koziel]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Langenberg]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Hardware deployment of hybrid PQC: SIKE+ ECDH]]></source>
<year>2021</year>
<conf-name><![CDATA[ Security and Privacy in Communication Networks: 17th EAI International Conference, SecureComm 2021]]></conf-name>
<conf-loc> </conf-loc>
<page-range>475-91</page-range><publisher-name><![CDATA[Springer International Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bernstein]]></surname>
<given-names><![CDATA[D. J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Curve25519: new Diffie-Hellman speed records]]></source>
<year>2006</year>
<conf-name><![CDATA[ Public Key Cryptography-PKC 2006: 9th International Conference on Theory and Practice in Public-Key Cryptography]]></conf-name>
<conf-loc>New York, NY, USA </conf-loc>
<page-range>207-28</page-range><publisher-loc><![CDATA[Berlin ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="">
<source><![CDATA[ECC Decision (08)01]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="">
<source><![CDATA[ECC Recommendation (08)01]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<collab>ETSI</collab>
<source><![CDATA[Intelligent Transport Systems (ITS); Security; Security header and certificate formats. Technical Specification (TS) TS 103 097]]></source>
<year>2021</year>
<publisher-name><![CDATA[European Telecommunications Standard Institute (ETSI)]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Eyupoglu]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Performance analysis of karatsuba multiplication algorithm for different bit lengths]]></article-title>
<source><![CDATA[Procedia-Social and Behavioral Sciences]]></source>
<year>2015</year>
<volume>195</volume>
<page-range>1860-4</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gaur]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Deepak]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mishra]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Estimation of Various Scalar Multiplication Algorithms in ECC]]></article-title>
<source><![CDATA[International Journal of Innovative Technology and Exploring Engineering]]></source>
<year>2019</year>
<volume>8</volume>
<numero>6S4</numero>
<issue>6S4</issue>
<page-range>183-6</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hossain]]></surname>
<given-names><![CDATA[M. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kong]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Saeedi]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Vayalil]]></surname>
<given-names><![CDATA[N. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[High&#8208;performance elliptic curve cryptography processor over NIST prime fields]]></article-title>
<source><![CDATA[IET Computers &amp; Digital Techniques]]></source>
<year>2017</year>
<volume>11</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>33-42</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hossain]]></surname>
<given-names><![CDATA[M. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Saeedi]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Kong]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[High-Performance FPGA Implementation of Elliptic Curve Cryptography Processor over Binary Field GF (2]]></article-title>
<source><![CDATA[ICISSP]]></source>
<year>2016</year>
<page-range>415-22</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Houmer]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ouaissa]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ouaissa]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Secure authentication scheme for 5g-based v2x communications]]></article-title>
<source><![CDATA[Procedia Computer Science]]></source>
<year>2022</year>
<volume>198</volume>
<page-range>276-81</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Cai]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Xiong]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A low hardware consumption elliptic curve cryptographic architecture over GF (p) in embedded application]]></article-title>
<source><![CDATA[Electronics]]></source>
<year>2018</year>
<volume>7</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>104</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<collab>IEEE 1609 Working Group</collab>
<source><![CDATA[IEEE standard for wireless access in vehicular environments-security services for applications and management messages]]></source>
<year>2016</year>
<publisher-name><![CDATA[IEEE Std, 1609]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Imran]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rashid]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Jafri]]></surname>
<given-names><![CDATA[A. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Kashif]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Throughput/area optimised pipelined architecture for elliptic curve crypto processor]]></article-title>
<source><![CDATA[IET Computers &amp; Digital Techniques]]></source>
<year>2019</year>
<volume>13</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>361-8</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ionita]]></surname>
<given-names><![CDATA[D. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Simion]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[FPGA Offloading for Diffie-Hellman Key Exchangeusing Elliptic Curves]]></article-title>
<source><![CDATA[Cryptology ePrint Archive]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Islam]]></surname>
<given-names><![CDATA[M. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hossain]]></surname>
<given-names><![CDATA[M. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Hasan]]></surname>
<given-names><![CDATA[M. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Shahjalal]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Jang]]></surname>
<given-names><![CDATA[Y. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[FPGA implementation of high-speed area-efficient processor for elliptic curve point multiplication over prime field]]></article-title>
<source><![CDATA[IEEE Access]]></source>
<year>2019</year>
<volume>7</volume>
<page-range>178811-26</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Islam]]></surname>
<given-names><![CDATA[M. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hossain]]></surname>
<given-names><![CDATA[M. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Hasan]]></surname>
<given-names><![CDATA[M. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Shahjalal]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Jang]]></surname>
<given-names><![CDATA[Y. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Design and implementation of high-performance ECC processor with unified point addition on twisted Edwards curve]]></article-title>
<source><![CDATA[Sensors]]></source>
<year>2020</year>
<volume>20</volume>
<numero>18</numero>
<issue>18</issue>
<page-range>5148</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Javeed]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[FPGA based high speed SPA resistant elliptic curve scalar multiplier architecture]]></article-title>
<source><![CDATA[International Journal of Reconfigurable Computing]]></source>
<year>2016</year>
<volume>2016</volume>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Javeed]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Low latency flexible FPGA implementation of point multiplication on elliptic curves over GF (p)]]></article-title>
<source><![CDATA[International Journal of Circuit Theory and Applications]]></source>
<year>2017</year>
<volume>45</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>214-28</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Javeed]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Scott]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[High performance hardware support for elliptic curve cryptography over general prime field]]></article-title>
<source><![CDATA[Microprocessors and Microsystems]]></source>
<year>2017</year>
<volume>51</volume>
<page-range>331-42</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kamaraj]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Radha]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Priyanka]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Punitha]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Intelligent transport system using integrated GPS optimized reader]]></source>
<year>2016</year>
<conf-name><![CDATA[ SecondInternational Conference on Science Technology Engineering and Management (ICONSTEM)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>332-6</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khan]]></surname>
<given-names><![CDATA[Z. U. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Benaissa]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Low area ECC implementation on FPGA]]></source>
<year>2013</year>
<conf-name><![CDATA[ 20International Conference on Electronics, Circuits, and Systems (ICECS)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>581-4</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khan]]></surname>
<given-names><![CDATA[Z. U.]]></given-names>
</name>
<name>
<surname><![CDATA[Benaissa]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[High-Speed and Low-Latency ECC Processor Implementation Over GF ($2]]></article-title>
<source><![CDATA[IEEE Transactions on Very Large Scale Integration (VLSI) Systems]]></source>
<year>2016</year>
<volume>25</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>165-76</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kodali]]></surname>
<given-names><![CDATA[R. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Boppana]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Saikiran]]></surname>
<given-names><![CDATA[A. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Amanchi]]></surname>
<given-names><![CDATA[C. N.]]></given-names>
</name>
</person-group>
<source><![CDATA[FPGA implementation of multiplication algorithms for ECC]]></source>
<year>2015</year>
<conf-name><![CDATA[ 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>549-54</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[KS]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Elavarasi]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[High Speed Efficient Karatsuba-Ofman Pipelined Multiplier for Low Contrast Image Enhancement]]></article-title>
<source><![CDATA[International Journal of Engineering and Advanced Technology]]></source>
<year>2013</year>
<volume>2</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>476-8</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marzouqi]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Al-Qutayri]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Salah]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Schinianakis]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Stouraitis]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A high-speed FPGA implementation of an RSD-based ECC processor]]></article-title>
<source><![CDATA[IEEE Transactions on very large scale integration (vlsi) systems]]></source>
<year>2015</year>
<volume>24</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>151-64</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mishra]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Pradhan]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Implementation of karatsuba algorithm using polynomial multiplication]]></article-title>
<source><![CDATA[Indian Journal of Computer Science and Engineering]]></source>
<year>2012</year>
<volume>976</volume>
<numero>5166</numero>
<issue>5166</issue>
<page-range>88-93</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Morales-Sandoval]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Flores]]></surname>
<given-names><![CDATA[L. A. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Cumplido]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Garcia-Hernandez]]></surname>
<given-names><![CDATA[J. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Feregrino]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Algredo]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A compact fpga-based accelerator for curve-based cryptography in wireless sensor networks]]></article-title>
<source><![CDATA[Journal of Sensors]]></source>
<year>2021</year>
<volume>2021</volume>
<page-range>1-13</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nadikuda]]></surname>
<given-names><![CDATA[P. K. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Boppana]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An area-efficient architecture for finite field inversion over GF (2m) using polynomial basis]]></article-title>
<source><![CDATA[Microprocessors and Microsystems]]></source>
<year>2022</year>
<volume>89</volume>
<page-range>104439</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Parthasarathy]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Multiplicative inverse in mod (m)]]></source>
<year>2012</year>
<page-range>1-3</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rashid]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Imran]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Jafri]]></surname>
<given-names><![CDATA[A. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Al-Somani]]></surname>
<given-names><![CDATA[T. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Flexible architectures for cryptographic algorithms-A systematic literature review]]></article-title>
<source><![CDATA[Journal of Circuits, Systems and Computers]]></source>
<year>2019</year>
<volume>28</volume>
<numero>03</numero>
<issue>03</issue>
<page-range>1930003</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rashidi]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Low-cost and fast hardware implementations of point multiplication on binary edwards curves]]></source>
<year>2018</year>
<conf-name><![CDATA[ Electrical Engineering (ICEE), Iranian Conference on]]></conf-name>
<conf-loc> </conf-loc>
<page-range>17-22</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rivest]]></surname>
<given-names><![CDATA[R. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Shamir]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Adleman]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A method for obtaining digital signatures and public-key cryptosystems]]></article-title>
<source><![CDATA[Communications of the ACM]]></source>
<year>1978</year>
<volume>21</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>120-6</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rohn]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An algorithm for computing all solutions of an absolute value equation]]></article-title>
<source><![CDATA[Optimization Letters]]></source>
<year>2012</year>
<volume>6</volume>
<page-range>851-6</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shah]]></surname>
<given-names><![CDATA[Y. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Javeed]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Azmat]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Redundant-signed-digit-based high speed elliptic curve cryptographic processor]]></article-title>
<source><![CDATA[Journal of Circuits, Systems and Computers]]></source>
<year>2019</year>
<volume>28</volume>
<numero>05</numero>
<issue>05</issue>
<page-range>1950081</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shor]]></surname>
<given-names><![CDATA[P. W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer]]></article-title>
<source><![CDATA[SIAM review]]></source>
<year>1999</year>
<volume>41</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>303-32</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yoshizawa]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Singelée]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Muehlberg]]></surname>
<given-names><![CDATA[J. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Delbruel]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Taherkordi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hughes]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Preneel]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey of security and privacy issues in v2x communication systems]]></article-title>
<source><![CDATA[ACM Computing Surveys]]></source>
<year>2023</year>
<volume>55</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>1-36</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Deng]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[LWRpro: An energy-efficient configurable crypto-processor for module-LWR]]></article-title>
<source><![CDATA[IEEE Transactions on Circuits and Systems I: Regular Papers]]></source>
<year>2021</year>
<volume>68</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>1146-59</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
