Table 6 Comparison between iterative methods and this work.
From: A generalized framework for elliptic curves based PRNG and its utilization in image encryption
Ref. no. | EC operations | Non-EC operations | EC selection | Period \(\mathbf{T}\) |
|---|---|---|---|---|
Ref.23, 2015 | Two multiplications One addition | Clocking the LFSR One addition Truncation | ECs defined over the field \({F}_{{2}^{m}}\) | \(T=C\times {(2}^{m}-1)\) where \(C\ge 1\) and \(m\) is the length of LFSR in bits |
Ref.24, 2015 | One multiplication One addition | Chaotic map iteration One addition One multiplication | EC defined over \({F}_{p}\) | \(T<{p}^{1-\delta }\) where \(\delta >0\) |
Ref.25, 2017 | One multiplication Two additions | Two multiplications Two additions One absolute value | The Internet Engineering Task Force (IETF)40 | Not given |
Ref.26, 2019 | One multiplication | One power Basis representation | Koblitz EC defined over \({F}_{p}\) | \(T=(n-1)/2\) where \(n\) is the order of generator point |
Ref.27, 2020 | One multiplication | Hash function Truncation | EC defined over \({F}_{p}\) | Not given |
This Work | One addition | Two truncations | NIST recommended ECs | Order of generator point |