2016
DOI: 10.1109/tc.2015.2417553
|View full text |Cite
|
Sign up to set email alerts
|

Parameter Space for the Architecture of FFT-Based Montgomery Modular Multiplication

Abstract: Modular multiplication is the core operation in public-key cryptographic algorithms such as RSA and the Diffie-Hellman algorithm. The efficiency of the modular multiplier plays a crucial role in the performance of these cryptographic methods. In this paper, improvements to FFT-based Montgomery Modular Multiplication (FFTM 3 ) using carry-save arithmetic and pre-computation techniques are presented. Moreover, pseudo-Fermat number transform is used to enrich the supported operand sizes for the FFTM 3 . The asymp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(3 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…Compared to our 3k-multiplier, we use 64-bit modulo and requires 256-point NTT with 24-bit each. This explains why our current design cannot gain further speed performance against the results from Chen et al [17].…”
Section: Discussion and Future Workmentioning
confidence: 69%
See 1 more Smart Citation
“…Compared to our 3k-multiplier, we use 64-bit modulo and requires 256-point NTT with 24-bit each. This explains why our current design cannot gain further speed performance against the results from Chen et al [17].…”
Section: Discussion and Future Workmentioning
confidence: 69%
“…In our implementation, we focus on 3k-multiplier implemented with fixed 64-bit Solinas prime and 64-bit data processing. On the other hand, Chen et al [17] introduced multiplier with comprehensive range (covering 1kbit to 15k-bit). These multiplier employs Pseudo-Fermat number as modulo for NTT, where the modulo ranges from 65-bit to 273-bit.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…Optimal solutions for multiplier implementations are based on the level of the required width. For multiplications involving millions or thousands of bits, NTT calculations are employed [3], [4]. On the other hand, for level in hundreds of bits, the divide and conquer approach becomes a preferable choice [5], [6].…”
Section: Introductionmentioning
confidence: 99%