I. Introduction
Public-key cryptographic algorithms are implemented in hardware to ensure low-area, high speed and reduced power consumption especially for mobile devices. Elliptic Curve Cryptography (ECC) is the most commonly used public-key cryptographic algorithm, especially in such resource-constrained devices. It is mainly used for mutual authentication and key agreement protocols in client-server environment to prevent unauthorized access. It is used to provide secure access in several applications, including Internet of Things (IoT) [1], [2]; Wireless Sensor Network (WSN) [3], secured file access in consumer storage devices [4], and protected personal communication devices [5], [6].