[PDF][PDF] Neural network method for base extension in residue number system.

MG Babenko, E Shiriaev, A Tchernykh… - ICCS-DE, 2020 - ceur-ws.org
Confidential data security is associated with the cryptographic primitives, asymmetric
encryption, elliptic curve cryptography, homomorphic encryption, cryptographic …

Hierarchical approach in RNS base extension for asymmetric cryptography

L Djath, K Bigou, A Tisserand - 2019 IEEE 26th Symposium on …, 2019 - ieeexplore.ieee.org
Base extension is a critical operation in RNS implementations of asymmetric cryptosystems.
In this paper, we propose a new way to perform base extensions using a hierarchical …

Study of modular inversion in RNS

JC Bajard, N Meloni, T Plantard - Advanced Signal Processing …, 2005 - spiedigitallibrary.org
Residue Numbers System have some features which are fine for some implementations of
cryptographic protocols. The main property of RNS is the distribution of the evaluation on …

Cryptographic Primitives Optimization Based on the Concepts of the Residue Number System and Finite Ring Neural Network

A Tchernykh, M Babenko, B Pulido-Gaytan… - … on Optimization and …, 2021 - Springer
Data encryption has become a vital mechanism for data protection. One of the main
challenges and an important target for optimization is the encryption/decryption speed. In …

Generating residue number system bases

JC Bajard, K Fukushima, S Kiyomoto… - 2021 IEEE 28th …, 2021 - ieeexplore.ieee.org
Residue number systems provide efficient techniques for speeding up calculations and/or
protecting against side channel attacks when used in the context of cryptographic …

Generating very large RNS bases

JC Bajard, K Fukushima, T Plantard… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Residue Number Systems (RNS) are proven to be effective in speeding up computations
involving additions and products. For these representations, there exists efficient modular …

Developing symmetric encryption methods based on residue number system and investigating their cryptosecurity

M Kasianchuk, M Karpinski, R Kochan… - Cryptology ePrint …, 2020 - eprint.iacr.org
This paper proposes new symmetric cryptoalgorithms of Residue Number System and its
Modified Perfect Form. According to the first method, ciphertext is regarded as a set of …

Methods of crypto-stable symmetric encryption in the residual number system

S Zawislak, M Kasianchuk, I Iakymenko… - Procedia Computer …, 2022 - Elsevier
This paper proposes new symmetric cryptography algorithms of Residue Number System
and its Modified Perfect Form. According to the first method, ciphertext is regarded as a set of …

Residue systems efficiency for modular products summation: Application to Elliptic Curves Cryptography

JC Bajard, S Duquesne, M Ercegovac… - Advanced Signal …, 2006 - spiedigitallibrary.org
Residue systems of representation, like Residue Number Systems (RNS) for primary field
(GF (p)) or Trinomial Residue Arithmetic for binary field (GF (2 k)), are characterized by …

Implementation of RNS and LNS based addition and subtraction units for cryptography

CS Kumar, A Prathiba… - … Conference on VLSI …, 2016 - ieeexplore.ieee.org
The need for fast data processing and reducing the power dissipation of digital signal
processing (DSP) algorithms and Cryptographic algorithms have provoked the development …