2004
DOI: 10.1016/j.micpro.2004.03.006
|View full text |Cite
|
Sign up to set email alerts
|

An FPGA implementation of a GF(p) ALU for encryption processors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
30
0

Year Published

2007
2007
2016
2016

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 55 publications
(31 citation statements)
references
References 11 publications
1
30
0
Order By: Relevance
“…But the maximum frequency was reduced to a very low level, because too many arithmetic operations have to be completed within one clock cycle. Similar drawbacks in frequency can also be found in [2,17].…”
Section: High-radix Montgomery Multiplicationsupporting
confidence: 63%
See 1 more Smart Citation
“…But the maximum frequency was reduced to a very low level, because too many arithmetic operations have to be completed within one clock cycle. Similar drawbacks in frequency can also be found in [2,17].…”
Section: High-radix Montgomery Multiplicationsupporting
confidence: 63%
“…From the perspective of the radix, the Montgomery multiplication implementations can be divided into two categories: radix-2 based [7,21] and high-radix based [1,2,9,11,17,19,20,22,23]. Compared with the former one, the latter, which can significantly reduce the required clock cycles, are preferred for high-speed applications.…”
Section: Introductionmentioning
confidence: 99%
“…While addition and subtraction are relatively easy to implement, modular multiplication is much more complex. An in depth review of modular arithmetic and architectures can be found in [8] The processor architecture in Figure 1 is capable of controlling a number a arithmetic units. There are two architecture types available for the processor.…”
Section: A Arithmetic Unitsmentioning
confidence: 99%
“…Therefore ECC has become final choice in smart cards, credit cards and mobile phones due to its strength to provide equivalent security compared to RSA. It is estimated that security level of 160 and 224 bits ECC cryptosystem is equivalent to the 1024 and 2048 bits RSA respectively [3,4] The research on efficient algorithms and hardware accelerations have concentrated on efficient implementation of elliptic curve point multiplication which is the fundamental operation of all elliptic curve cryptosystems. The elliptic curve point multiplication is computed with point operations which, further are computed using finite field arithmetic.…”
Section: Introductionmentioning
confidence: 99%