Research Article

Mimic Encryption Box for Network Multimedia Data Security

Table 5

Implementation of each ECC module.

ModuleFrequency (MHz)LUTsREGsDSPCalculation period

Point addition258625438014412
Double point259685362014412
Point multiplication control251489721703064
Coordinate transformation25178204401144225
Master state machine5025212940ā€”