2011
DOI: 10.1109/tie.2010.2080653
|View full text |Cite
|
Sign up to set email alerts
|

Modular Multiplication and Exponentiation Architectures for Fast RSA Cryptosystem Based on Digit Serial Computation

Abstract: Modular exponentiation with large modulus and exponent, which is usually accomplished by repeated modular multiplications, has been widely used in public key cryptosystems. Typically, the Montgomery's modular-multiplication algorithm is used since no trial division is necessary, and the carry-save addition (CSA) is employed to reduce the critical path. In this paper, we optimize the Montgomery's multiplication and propose architectures to perform the least significant bit first and the most significant bit fir… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 70 publications
(37 citation statements)
references
References 21 publications
0
37
0
Order By: Relevance
“…The works in [5,6,[26][27][28][29] are believed to be the latest RSA, ECC, and multivariate public key cryptographic systems on hardware, respectively. We compare our design with these systems, which is depicted in Table 4.…”
Section: Comparisons With Other Implementationsmentioning
confidence: 99%
See 1 more Smart Citation
“…The works in [5,6,[26][27][28][29] are believed to be the latest RSA, ECC, and multivariate public key cryptographic systems on hardware, respectively. We compare our design with these systems, which is depicted in Table 4.…”
Section: Comparisons With Other Implementationsmentioning
confidence: 99%
“…Since software implementations even on multicore processors can often not provide the performance level needed, hardware implementations are thus the only option, which appear to be a promising solution to inherent performance issues of public key cryptographic systems and provide greater resistance to tampering. Among hardware implementations of public key cryptographic systems, RSA and elliptic curves systems are the most widely adopted candidates [5][6][7][8][9][10][11][12][13][14]. Their security lies in the difficulty of factorizing large integers and the discrete logarithm problem, respectively.…”
Section: Introductionmentioning
confidence: 99%
“…Gustavo D. Sutter, Jean-Pierre Deschamps, and José Luis Imaña [2] presented Modular exponentiation with large modulus and exponent, which is usually accomplished by repeated modular multiplications, has been widely used in public key cryptosystems. Typically, the Montgomery's modular-multiplication algorithm is used since no trial division is necessary, and the carry-save addition (CSA) is employed to reduce the critical path.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The most straightforward way of performing a modular exponentiation is by repeated squarings and multiplications to get the final result [6,34]. The square and multiply step can be performed either in parallel [22] or sequentially [13].…”
Section: Related Workmentioning
confidence: 99%