Review Article
A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices
Table 3
Duration of 1 scalar multiplication
.
| No. | ā | Platform | Slices | f [MHz] | [ms] | |
| 1 | Full Custom HW | [26] | 16000 | 45 | 20,2 | 1,03 | 2 | 8051 & CoPro | [18] | 3781 | 12 | 2488 | 33,89 | 3 | Microblaze & Coproc | [16] | 1984 | 33 | 26,7 | 1 | 4 | CrP | [27] | 1854 (+2379 for memory) | 31,25 | 30,3 | 1,07 |
4 | HECC processor | This work | 2439 | 50 | 8,0693 | 0,46 |
|
|