17th IEEE Symposium on Computer Arithmetic (ARITH'05)
DOI: 10.1109/arith.2005.34
|View full text |Cite
|
Sign up to set email alerts
|

Parallel Montgomery Multiplication in GF (2^k) Using Trinomial Residue Arithmetic

Abstract: We propose the first general multiplication algorithm in GF(2 k ) with a subquadratic area complexity of O(k 8/5 ) = O(k 1.6 ). Using the Chinese Remainder Theorem, we represent the elements of GF(2 k ); i.e. the polynomials in GF (2)[X] of degree at most k − 1, by their remainder modulo a set of n pairwise prime trinomials, T 1 , . . . , T n , of degree d and such that nd ≥ k. Our algorithm is based on Montgomery's multiplication applied to the ring formed by the direct product of the trinomials.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
21
0

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(22 citation statements)
references
References 21 publications
1
21
0
Order By: Relevance
“…The second type are the subquadratic space complexity designs which require smaller number of gates for their implementation (O(n δ ), δ < 2), cf. [2], [11], [15], [1]. The latter presents practical architectures for hardware implementation of large field sizes, specially used in elliptic curve cryptographic applications [7], [10] (163 < n < 571).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The second type are the subquadratic space complexity designs which require smaller number of gates for their implementation (O(n δ ), δ < 2), cf. [2], [11], [15], [1]. The latter presents practical architectures for hardware implementation of large field sizes, specially used in elliptic curve cryptographic applications [7], [10] (163 < n < 571).…”
Section: Introductionmentioning
confidence: 99%
“…Another well-known algorithm is the Winograd short convolution algorithm [17] used for the same purpose in [15]. Chinese Reminder Theorem (CRT) is another example of such algorithms that results in subquadratic complexity multipliers [1].…”
Section: Introductionmentioning
confidence: 99%
“…Horner's rule is a basic and widely used method for computing polynomials, and is used in numerous complex applications [13,14,15,16]. It works by transforming the polynomial into a series of multiply-add operations.…”
Section: Horner's Rulementioning
confidence: 99%
“…cryptography, see the survey [45] and [40,41,42,43,40]. For a general and recent reference on elliptic cryptography, see [99].…”
Section: Annales De L'institut Fouriermentioning
confidence: 99%