2011
DOI: 10.1109/tc.2010.258
|View full text |Cite
|
Sign up to set email alerts
|

Concurrent Error Detection in Montgomery Multiplication over Binary Extension Fields

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

1
39
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(40 citation statements)
references
References 28 publications
1
39
0
Order By: Relevance
“…The MM was successfully adapted to finite field GFð2 m Þ by Koc and Acar [4]. The MM over GFð2 m Þ is a very efficient solution for the design of a fast architecture and VLSI implementation [5,6]. Hariri and Reyhani-Masoleh have considered concurrent error detection for MM over GFð2 m Þ [6].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The MM was successfully adapted to finite field GFð2 m Þ by Koc and Acar [4]. The MM over GFð2 m Þ is a very efficient solution for the design of a fast architecture and VLSI implementation [5,6]. Hariri and Reyhani-Masoleh have considered concurrent error detection for MM over GFð2 m Þ [6].…”
Section: Introductionmentioning
confidence: 99%
“…The MM over GFð2 m Þ is a very efficient solution for the design of a fast architecture and VLSI implementation [5,6]. Hariri and Reyhani-Masoleh have considered concurrent error detection for MM over GFð2 m Þ [6]. Three different multipliers, namely the bit-serial, digit-serial, and bit-parallel multipliers, have been considered and the concurrent error detection scheme has been derived and implemented for each of them.…”
Section: Introductionmentioning
confidence: 99%
“…In [33], the multilinear arithmetic codes are used to protect integer multipliers. In [34]- [39], parity-based codes are used to protect bit-serial, digit-serial and bit-parallel Montgomery modular multiplication over binary fields (MMMobf). In [40] and [41], the authors use nonlinear robust residue codes to protect basic integer multipliers.…”
mentioning
confidence: 99%
“…The technique in [33] is applied to protect simple 16-bit and 32-bit integer multipliers. The method in [39] is used to protect MMMobf, and the average error-reporting delay is about 50% of whole MMM computing time. Gaubatz et al [40] and Kulikowski et al [41] mentioned but did not provide any practical implementation of the concept of protecting MMMopf by protecting the internal basic integer multipliers.…”
mentioning
confidence: 99%
See 1 more Smart Citation