Evolutionary RSA-based cryptographic hardware using the Co-design methodology

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Most Glyptography systems are based on the modular exponentiation to perform the non-linear scrambling operation of data. It is performed using successive modular multiplications, which are time consuming for large operands. Accelerating cryptography needs optimising the time consumed by a single modular multiplication and/or reducing the total number of modular multiplications performed. Using a genetic algorithm, we first yield the minimal sequence of powers, generally called addition chain, that need to be computed to finally obtain the modular exponentiation result. Then, we exploit the co-design methodology to engineer a cryptographic device that accelerates the encryption/decryption throughput without requiring considerable hardware area.

Cite

CITATION STYLE

APA

Nedjah, N., & De Macedo Mourelle, L. (2004). Evolutionary RSA-based cryptographic hardware using the Co-design methodology. In Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science) (Vol. 3029, pp. 351–360). Springer Verlag. https://doi.org/10.1007/978-3-540-24677-0_37

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free