2019 IEEE 26th Symposium on Computer Arithmetic (ARITH) 2019
DOI: 10.1109/arith.2019.00016
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical Approach in RNS Base Extension for Asymmetric Cryptography

Abstract: Base extension is a critical operation in RNS implementations of asymmetric cryptosystems. In this paper, we propose a new way to perform base extensions using a hierarchical approach for computing the Chinese remainder theorem. For well chosen parameters, it significantly reduces the computational cost and still ensures a high level of internal parallelism. We illustrate the interest of the proposed approach on the cost of typical arithmetic primitives used in asymmetric cryptography. We also demonstrate impr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…A hierarchical base extension (HBE) approach has been introduced in [11] for ECC in FPGA implementations. The k moduli are seen as a matrix of r rows and c columns (i.e., k = r × c).…”
Section: Notations and State Of The Artmentioning
confidence: 99%
See 3 more Smart Citations
“…A hierarchical base extension (HBE) approach has been introduced in [11] for ECC in FPGA implementations. The k moduli are seen as a matrix of r rows and c columns (i.e., k = r × c).…”
Section: Notations and State Of The Artmentioning
confidence: 99%
“…The BE is then performed over the r super-residues, leading to a reduction of the BE complexity. The correction step for α presented in [11] (derived from [16]) has been managed directly in the HBE algorithm but it requires pseudo-Mersenne moduli. Paper [11] only provides algorithms and results for c = 2.…”
Section: Notations and State Of The Artmentioning
confidence: 99%
See 2 more Smart Citations
“…In a domain such as cryptography, arithmetic operations are performed modulo large numbers that are often prime, the use of RNS becomes more complicate as modular reduction requires a conversion of RNS bases [20], [21], [22], [23]. This last point has generated a rich literature, in particular around the choice of bases for efficient implementations [15], [24], [25], [26].…”
Section: Introductionmentioning
confidence: 99%