Elliptic Curves Cryptography for Lightweight Devices in IoT Systems

Ana Simon Francia, Javier Solis-Lastra, Erik Alex Papa Quiroz

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations


To protect data confidentiality, cryptographic methods are widely used, however, traditional methods require a higher level of computational resources to achieve a higher level of security. For this reason, ECC (Elliptic Curves Cryptography) is considered as a promising solution. This paper shows a systematic review about ECC methods for IoT systems. Our research questions were related to find out the principal applications of ECC, criteria for implementing ECC and the appropriate elliptic curves for lightweight devices. The papers were collected from Scopus, Science Direct and SpringerLink and after doing the study, we conclude that IoT is the principal application of ECC, the processing time is the most common implementation criteria and the Koblitz elliptic curve over prime fields are accurate for IoT.

Original languageEnglish
Title of host publicationEmerging Research in Intelligent Systems - Proceedings of the CIT 2021
EditorsMiguel Botto-Tobar, Henry Cruz, Angela Díaz Cadena, Benjamin Durakovic
PublisherSpringer Science and Business Media Deutschland GmbH
Number of pages12
ISBN (Print)9783030960421
StatePublished - 2022
Externally publishedYes
Event16th Multidisciplinary International Congress on Science and Technology, CIT 2021 - Quito, Ecuador
Duration: 14 Jun 202118 Jun 2021

Publication series

NameLecture Notes in Networks and Systems
Volume405 LNNS
ISSN (Print)2367-3370
ISSN (Electronic)2367-3389


Conference16th Multidisciplinary International Congress on Science and Technology, CIT 2021

Bibliographical note

Publisher Copyright:
© 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.


  • Cryptography
  • Elliptic curve cryptography
  • IoT


Dive into the research topics of 'Elliptic Curves Cryptography for Lightweight Devices in IoT Systems'. Together they form a unique fingerprint.

Cite this