Table 6 Comparison between iterative methods and this work.

From: A generalized framework for elliptic curves based PRNG and its utilization in image encryption

Ref. no.

EC operations

Non-EC operations

EC selection

Period \(\mathbf{T}\)

Ref.23, 2015

Two multiplications

One addition

Clocking the LFSR

One addition

Truncation

ECs defined over the field \({F}_{{2}^{m}}\)

\(T=C\times {(2}^{m}-1)\)

where \(C\ge 1\) and \(m\) is the length of LFSR in bits

Ref.24, 2015

One multiplication

One addition

Chaotic map iteration

One addition

One multiplication

EC defined over \({F}_{p}\)

\(T<{p}^{1-\delta }\)

where \(\delta >0\)

Ref.25, 2017

One multiplication

Two additions

Two multiplications

Two additions

One absolute value

The Internet Engineering Task Force (IETF)40

Not given

Ref.26, 2019

One multiplication

One power

Basis representation

Koblitz EC defined over \({F}_{p}\)

\(T=(n-1)/2\)

where \(n\) is the order of generator point

Ref.27, 2020

One multiplication

Hash function

Truncation

EC defined over \({F}_{p}\)

Not given

This Work

One addition

Two truncations

NIST recommended ECs

Order of generator point