2022
DOI: 10.1002/cta.3206
|View full text |Cite
|
Sign up to set email alerts
|

High‐speed parallel reconfigurable Fp multipliers for elliptic curve cryptography applications

Abstract: Elliptic curve cryptography (ECC) protocols due to higher security strength per bit have been widely accepted and deployed. Finite field multiplication is the most computational intensive operation in data security protocols developed using ECC. This paper presents two high-speed parallel re-configurable finite field multipliers: PIMD-2 and PIMD-3 over prime field (F p ) for ECC applications. The proposed designs are based on the new novel optimized interleaved multiplication algorithms. This work first identi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 46 publications
0
6
0
Order By: Relevance
“…A highperformance ECC processor architecture over curve448 is presented in [21], where a novel variant of the Karatsuba formula for asymmetric digit multiplier is incorporated for polynomial multiplications. The work described in [22] offers high-speed and reconfigurable polynomial multiplication architectures for specific prime fields. A high-speed point multiplier for Goldlilocks-curve448 is presented in [23].…”
Section: A Existing Hardware Designs and Limitationsmentioning
confidence: 99%
“…A highperformance ECC processor architecture over curve448 is presented in [21], where a novel variant of the Karatsuba formula for asymmetric digit multiplier is incorporated for polynomial multiplications. The work described in [22] offers high-speed and reconfigurable polynomial multiplication architectures for specific prime fields. A high-speed point multiplier for Goldlilocks-curve448 is presented in [23].…”
Section: A Existing Hardware Designs and Limitationsmentioning
confidence: 99%
“…Several pertinent modifications and associated hardware architectures [19], [20], [24], [30], [33], [35] have been proposed for the R2IM algorithm. References [19], [30], and [33] are executing single iteration in one clock cycle while [19], [24], and [35] are based on radix-4, where two consecutive bits of a multiplier are executed in a single clock cycle. Moreover, [20] and [24] reduced the data dependency among critical operations and executed them in parallel.…”
Section: B Proposed Parallel Im Algorithmmentioning
confidence: 99%
“…References [19], [30], and [33] are executing single iteration in one clock cycle while [19], [24], and [35] are based on radix-4, where two consecutive bits of a multiplier are executed in a single clock cycle. Moreover, [20] and [24] reduced the data dependency among critical operations and executed them in parallel. However, these designs employed multiple processing units for the generation, reduction, and addition of possible partial products.…”
Section: B Proposed Parallel Im Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…In previous works, modular multipliers are based on MM 27,[43][44][45][46][47] while others are developed using the IM method. 25,29,31,33,[48][49][50][51][52] In these designs, several modifications have been introduced to reduce computational delay and hardware area occupation such as carry-save addition, residue number system (RNS), redundant sign digit (RSD) system, and even some designs utilizing built-in components of the modern FPGAs.…”
Section: Introductionmentioning
confidence: 99%