Efficient hardware implementation of modular multiplication and exponentiation for public-key cryptography

4Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Modular multiplication and modular exponentiation are fundamental operations in most public-key cryptosystems such as RSA and DSS. In this paper, we propose a novel implementation of these operations using systolic arrays based architectures. For this purpose, we use the Montgomery algorithm to compute the modular product and the left-to-right binary exponentiation method to yield the modular power. Our implementation improves time requirement as well as the timexarea factor when compared that of Blum's and Paar's. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Nedjah, N., & De Macedo Mourelle, L. (2003). Efficient hardware implementation of modular multiplication and exponentiation for public-key cryptography. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2565, 451–463. https://doi.org/10.1007/3-540-36569-9_30

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free