2012
DOI: 10.1049/el.2012.1767
|View full text |Cite
|
Sign up to set email alerts
|

Area-efficient and ultra-low-power architecture of RSA processor for RFID

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 6 publications
0
10
0
Order By: Relevance
“…We also propose modified algorithms and architectures to improve operation speed and reduce power consumption in Refs. [14,15]. To further improve the performance of RSA, we researched and modified Montgomery modular multiplication algorithm based on these works.…”
Section: The Classic Montgomery Modular Multiplication Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…We also propose modified algorithms and architectures to improve operation speed and reduce power consumption in Refs. [14,15]. To further improve the performance of RSA, we researched and modified Montgomery modular multiplication algorithm based on these works.…”
Section: The Classic Montgomery Modular Multiplication Algorithmmentioning
confidence: 99%
“…Based on this observation, we proposed a new type of Montgomery algorithm in Ref. [15]. This algorithm needs only one clock cycle to finish the key computation mentioned above so that the operating speed is doubled.…”
Section: The Proposed Improved Montgomery Vlsi Implementation Algorithmmentioning
confidence: 99%
“…RFID tags [3]. While a number of lightweight authentication protocols have been proposed in [4,5,6,7,8], none of them offers a complete security solution in the context of the key three qualities of lightweight mutual authentication, availability and tag unclonability. Therefore, none of them is truly secure solution in providing fraud protection, secure access and anti-counterfeiting.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, none of them is truly secure solution in providing fraud protection, secure access and anti-counterfeiting. For example, none of the schemes proposed in [4,5,6] protect against physical cloning attacks. The WIPR protocol proposed by Arbit et al [4] uses the shared public key pre-installed in the tag memory and is vulnerable to tag cloning attack and does not provide mutual authentication.…”
Section: Introductionmentioning
confidence: 99%
“…Most of these implementation efforts are concentrated on reducing the register number of elliptic curve cryptography processor without considering the practical applications, such as the transaction time. Generally, the total transaction time of RFID is required less than 300 ms [ 14 ]. However, most papers for RFID show that the time consumption to finish one point multiplication is over or close to 300 ms.…”
Section: Introductionmentioning
confidence: 99%