1985
DOI: 10.2307/2007970
|View full text |Cite
|
Sign up to set email alerts
|

Modular Multiplication Without Trial Division

Abstract: Abstract. Let N > 1. We present a method for multiplying two integers (called N-residues) modulo N while avoiding division by N. N-residues are represented in a nonstandard way, so this method is useful only if several computations are done modulo one N. The addition and subtraction algorithms are unchanged. To validate REDC, observe mN = TN'N = -Tmod R, so t is an integer. Also, tR = Tmod N so t = TR'X mod N. Thirdly, 0 < T + mN < RN + RN, so 0 < t < 2N.If R and N are large, then T + mN may exceed the largest… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
516
0
2

Year Published

2004
2004
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 1,163 publications
(520 citation statements)
references
References 1 publication
2
516
0
2
Order By: Relevance
“…Montgomery introduced an efficient algorithm for calculating modular multiplication [3]. Consider the residue class ring of integers with an odd modulus M .…”
Section: Montgomery's Modular Multiplication Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…Montgomery introduced an efficient algorithm for calculating modular multiplication [3]. Consider the residue class ring of integers with an odd modulus M .…”
Section: Montgomery's Modular Multiplication Algorithmmentioning
confidence: 99%
“…Modular multiplication with a large modulus is the basic operation in calculating modular exponentiation which is used to process public-key cryptosystems such as RSA [4]. One of the efficient methods for calculating the modular multiplication is by using Montgomery's multiplication algorithm [3]. Several implementations of the algorithm have been proposed [1].…”
Section: Introductionmentioning
confidence: 99%
“…This is accomplished by storing the reduction result either to the target or a dummy memory location via masking of the operand addresses. The crucial prime-field multiplication utilizes an unrolled Separated Product Scanning (SPS) method of the Montgomery multiplication [28] that is derived from [10]. The SPS variant is chosen because of the particular F p 2 -multiplication technique [6,31] we use, which performs the required three multiplications and two reductions separately.…”
Section: Assembly-optimized Software Implementation (A)mentioning
confidence: 99%
“…Clearly, the last two instructions can be used to implement modular multiplication, based on Montgomery's reduction algorithm [22], in prime or binary Galois Fields. This multiplication is the most critical opearation of EC point multiplication required for EC decryption.…”
Section: A Vector Processor For Elliptic Curve Cryptographymentioning
confidence: 99%