Montgomery exponentiation with no final subtractions: Improved results

91Citations
Citations of this article
42Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The Montgomery multiplication is commonly used as the core algorithm for cryptosystems based on modular arithmetic. With the advent of new classes of attacks (timing attacks, power attacks), the implementation of the algorithm should be carefully studied to thwart those attacks. Recently, Colin D. Walter proposed a constant time implementation of this algorithm [17,18]. In this paper, we propose an improved (faster) version of this implementation. We also provide figures about the overhead of these versions relatively to a speed optimised version (theoretically and experimentally). © Springer-Verlag Berlin Heidelberg 2000.

Cite

CITATION STYLE

APA

Hachez, G., & Quisquater, J. J. (2000). Montgomery exponentiation with no final subtractions: Improved results. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1965 LNCS, pp. 293–301). Springer Verlag. https://doi.org/10.1007/3-540-44499-8_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free