2010 International Conference on Field Programmable Logic and Applications 2010
DOI: 10.1109/fpl.2010.89
|View full text |Cite
|
Sign up to set email alerts
|

A Karatsuba-Based Montgomery Multiplier

Abstract: Modular multiplication of long integers is an important building block for cryptographic algorithms. Although several FPGA accelerators have been proposed for large modular multiplication, previous systems have been based on O(N 2 ) algorithms. In this paper, we present a Montgomery multiplier that incorporates the more efficient Karatsuba algorithm which is O(N (log 3/ log 2) ). This system is parameterizable to different bitwidths and makes excellent use of both embedded multipliers and fine-grained logic. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(24 citation statements)
references
References 13 publications
0
24
0
Order By: Relevance
“…Many hardware designs for computing Montgomery multiplications exist. A design involving the Karatsuba multiplication algorithm can be used to evaluate very large multiplications [11]. While this proved to be computationally effective in [11], such a method may not be suitable for some applications due to prohibitive hardware resource required for evaluating Montgomery multiplications even with relatively small operands.…”
Section: Return T 19: End Functionmentioning
confidence: 99%
“…Many hardware designs for computing Montgomery multiplications exist. A design involving the Karatsuba multiplication algorithm can be used to evaluate very large multiplications [11]. While this proved to be computationally effective in [11], such a method may not be suitable for some applications due to prohibitive hardware resource required for evaluating Montgomery multiplications even with relatively small operands.…”
Section: Return T 19: End Functionmentioning
confidence: 99%
“…Theoretical minimum number ℓ of zero higher-order h-bit faulty signatures required to factor a balanced 1024-bit RSA modulus N using the general Cohn-Heninger attack or the simplified linear one. After a discussion about the tools needed to get the desired effects, we focus on several implementation proposals [29,18,16,21,28,19,6], chosen for their relevance.…”
Section: Fault Modelsmentioning
confidence: 99%
“…After a discussion about the tools needed to get the desired effects, we focus on several implementation proposals [29,18,16,21,28,19,6], chosen for their relevance.…”
Section: Fault Modelsmentioning
confidence: 99%
“…To reduce the full complexity of the big multiplication, interpolation techniques are used. In [6], a classical nested Karatsuba multiplication is used, whereas [21] proposes RNS.…”
Section: High Radixmentioning
confidence: 99%