[PDF][PDF] Neural network method for base extension in residue number system.
Confidential data security is associated with the cryptographic primitives, asymmetric
encryption, elliptic curve cryptography, homomorphic encryption, cryptographic …
encryption, elliptic curve cryptography, homomorphic encryption, cryptographic …
Hierarchical approach in RNS base extension for asymmetric cryptography
L Djath, K Bigou, A Tisserand - 2019 IEEE 26th Symposium on …, 2019 - ieeexplore.ieee.org
Base extension is a critical operation in RNS implementations of asymmetric cryptosystems.
In this paper, we propose a new way to perform base extensions using a hierarchical …
In this paper, we propose a new way to perform base extensions using a hierarchical …
Study of modular inversion in RNS
Residue Numbers System have some features which are fine for some implementations of
cryptographic protocols. The main property of RNS is the distribution of the evaluation on …
cryptographic protocols. The main property of RNS is the distribution of the evaluation on …
Cryptographic Primitives Optimization Based on the Concepts of the Residue Number System and Finite Ring Neural Network
Data encryption has become a vital mechanism for data protection. One of the main
challenges and an important target for optimization is the encryption/decryption speed. In …
challenges and an important target for optimization is the encryption/decryption speed. In …
Generating residue number system bases
JC Bajard, K Fukushima, S Kiyomoto… - 2021 IEEE 28th …, 2021 - ieeexplore.ieee.org
Residue number systems provide efficient techniques for speeding up calculations and/or
protecting against side channel attacks when used in the context of cryptographic …
protecting against side channel attacks when used in the context of cryptographic …
Generating very large RNS bases
JC Bajard, K Fukushima, T Plantard… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Residue Number Systems (RNS) are proven to be effective in speeding up computations
involving additions and products. For these representations, there exists efficient modular …
involving additions and products. For these representations, there exists efficient modular …
Developing symmetric encryption methods based on residue number system and investigating their cryptosecurity
M Kasianchuk, M Karpinski, R Kochan… - Cryptology ePrint …, 2020 - eprint.iacr.org
This paper proposes new symmetric cryptoalgorithms of Residue Number System and its
Modified Perfect Form. According to the first method, ciphertext is regarded as a set of …
Modified Perfect Form. According to the first method, ciphertext is regarded as a set of …
Methods of crypto-stable symmetric encryption in the residual number system
S Zawislak, M Kasianchuk, I Iakymenko… - Procedia Computer …, 2022 - Elsevier
This paper proposes new symmetric cryptography algorithms of Residue Number System
and its Modified Perfect Form. According to the first method, ciphertext is regarded as a set of …
and its Modified Perfect Form. According to the first method, ciphertext is regarded as a set of …
Residue systems efficiency for modular products summation: Application to Elliptic Curves Cryptography
JC Bajard, S Duquesne, M Ercegovac… - Advanced Signal …, 2006 - spiedigitallibrary.org
Residue systems of representation, like Residue Number Systems (RNS) for primary field
(GF (p)) or Trinomial Residue Arithmetic for binary field (GF (2 k)), are characterized by …
(GF (p)) or Trinomial Residue Arithmetic for binary field (GF (2 k)), are characterized by …
Implementation of RNS and LNS based addition and subtraction units for cryptography
CS Kumar, A Prathiba… - … Conference on VLSI …, 2016 - ieeexplore.ieee.org
The need for fast data processing and reducing the power dissipation of digital signal
processing (DSP) algorithms and Cryptographic algorithms have provoked the development …
processing (DSP) algorithms and Cryptographic algorithms have provoked the development …