2000
DOI: 10.1007/3-540-44499-8_22
|View full text |Cite
|
Sign up to set email alerts
|

A Scalable and Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m)

Abstract: Abstract. We describe a scalable and unified architecture for a Montgomery multiplication module which operates in both types of finite fields GF (p) and GF (2 m ). The unified architecture requires only slightly more area than that of the multiplier architecture for the field GF (p). The multiplier is scalable, which means that a fixed-area multiplication module can handle operands of any size, and also, the wordsize can be selected based on the area and performance requirements. We utilize the concurrency in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
110
0

Year Published

2001
2001
2012
2012

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 92 publications
(110 citation statements)
references
References 18 publications
0
110
0
Order By: Relevance
“…If the third operand is all zeros then the first operand is routed to the destination FU; otherwise the second operand is the one routed to the destination FU. The MUX is not needed to implement any of the AES candidates but it is necessary for the implementation of multiple-precision algorithms for the asymmetric cryptographic algorithms [20]. If-conditions are program sections that pose security vulnerabilities with respect to sidechannel attacks on control-oriented processors [1].…”
Section: Readreg Writereg Readsboxmentioning
confidence: 99%
“…If the third operand is all zeros then the first operand is routed to the destination FU; otherwise the second operand is the one routed to the destination FU. The MUX is not needed to implement any of the AES candidates but it is necessary for the implementation of multiple-precision algorithms for the asymmetric cryptographic algorithms [20]. If-conditions are program sections that pose security vulnerabilities with respect to sidechannel attacks on control-oriented processors [1].…”
Section: Readreg Writereg Readsboxmentioning
confidence: 99%
“…the ability to process operands of any size without the need to modify or re-design a given implementation [19]. The ECAU contains a 192-bit multiplier that can be used for any binary extension field GF(2 m ) of degree up to 192, e.g.…”
Section: Improvements Over Previous Workmentioning
confidence: 99%
“…This means that our system is limited scalable similar to the cryptographic processor described in [9], but does not provide the high scalability of the ECC hardware from [19]. We emphasize that attaining scalability in hardware/software co-design affects all abstraction levels and layers between hardware and software (including the operand transfers), and is not a "pure" hardware design issue as in [19]. For instance, when 1 Batina et al presented a hyperelliptic curve cryptosystem of genus 2 over the field GF(2 83 ).…”
Section: Improvements Over Previous Workmentioning
confidence: 99%
“…Alternatives are heavy-weight accelerators for complete EC operations [4,5,7,8] or hardware-software co-design approaches where com-putational intensive tasks are done by an EC coprocessor [9]. These coprocessors can either calculate all finite field operations [12] or support only multiplication as the most demanding finite field operation [10,11]. Circuits for calculating the multiplicative inverse in the finite fields GF(p) and GF(2 m ) are rare [12,13].…”
Section: Related Workmentioning
confidence: 99%
“…Even than, exponentiation takes more than 100 times longer than multiplication which makes the use of affine coordinates for EC operations unattractive. Useful multipliers which can operate both in GF(p) and GF(2 m ) were presented by J. Großschädl [11] and E. Savaş et al [10]. J. Großschädl's approach uses a dual-field bit-serial multiplier utilizing interleaved modular reduction.…”
Section: Related Workmentioning
confidence: 99%