Efficient scalable VLSI architecture for Montgomery inversion in GF (p)
AAA Gutub, AF Tenca - Integration, 2004 - Elsevier
The multiplicative inversion operation is a fundamental computation in several cryptographic
applications. In this work, we propose a scalable VLSI hardware to compute the Montgomery …
applications. In this work, we propose a scalable VLSI hardware to compute the Montgomery …
Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2n)
A Abdul-Aziz Gutub, AF Tenca, E Savaş… - … and Embedded Systems …, 2003 - Springer
Computing the inverse of a number in finite fields GF (p) or GF (2 n) is equally important for
cryptographic applications. This paper proposes a novel scalable and unified architecture …
cryptographic applications. This paper proposes a novel scalable and unified architecture …
Scalable VLSI architecture for GF (p) Montgomery modular inverse computation
Modular inverse computation is needed in several public key cryptographic applications. In
this work, we present two VLSI hardware implementations used in the calculation of …
this work, we present two VLSI hardware implementations used in the calculation of …
Elliptic curve based hardware architecture using cellular automata
JC Jeon, KY Yoo - Mathematics and Computers in Simulation, 2008 - Elsevier
This study presents an efficient division architecture using restricted irreducible polynomial
on elliptic curve cryptosystem (ECC), based on cellular automata. The most expensive …
on elliptic curve cryptosystem (ECC), based on cellular automata. The most expensive …
[图书][B] New hardware algorithms and designs for Montgomery modular inverse computation in Galois fields GF (p) and GF (2n)
AAA Gutub - 2003 - search.proquest.com
The computation of the inverse of a number in finite fields, namely Galois Fields GF (p) or GF
(2 n), is one of the most complex arithmetic operations in cryptographic applications. In this …
(2 n), is one of the most complex arithmetic operations in cryptographic applications. In this …
Efficient scalable hardware architecture for Montgomery inverse computation in GF (p)
AAA Gutub, AF Tenca - 2003 IEEE Workshop on Signal …, 2003 - ieeexplore.ieee.org
The Montgomery inversion is a fundamental computation in several cryptographic
applications. We propose a scalable hardware architecture to compute the Montgomery …
applications. We propose a scalable hardware architecture to compute the Montgomery …
Montgomery exponent architecture based on programmable cellular automata
JC Jeon, KY Yoo - Mathematics and Computers in Simulation, 2008 - Elsevier
This study presents an efficient exponent architecture for public-key cryptosystems using
Montgomery multiplication based on programmable cellular automata (PCA). Multiplication …
Montgomery multiplication based on programmable cellular automata (PCA). Multiplication …
Design of Montgomery multiplication architecture based on programmable cellular automata
JC Jeon, KY Yoo - Computational intelligence, 2004 - Wiley Online Library
This study presents a Montgomery multiplication architecture that uses an irreducible all one
polynomial (AOP) in GF (2m) based on a programmable cellular automata (PCA). The …
polynomial (AOP) in GF (2m) based on a programmable cellular automata (PCA). The …
Polynomial division using left shift register
In this short note, we describe a simple polynomial division circuit based on a left shift
register. The circuit essentially performs the modulo operation f (x) mod p (x). It is shown how …
register. The circuit essentially performs the modulo operation f (x) mod p (x). It is shown how …
An evolutionary approach to the design of cellular automata architecture for multiplication in elliptic curve cryptography over finite fields
JC Jeon, KY Yoo - PRICAI 2004: Trends in Artificial Intelligence: 8th …, 2004 - Springer
Cellular Automata (CA) has been used in evolutionary computation for over a decade and
Elliptic Curve Cryptography (ECC) has recently received a lot of attention due to their …
Elliptic Curve Cryptography (ECC) has recently received a lot of attention due to their …