A resource efficient software-hardware co-design of lattice-based homomorphic encryption scheme on the FPGA
Lattice-based homomorphic encryption schemes provide strong resistance against quantum
and classical computer-based adversary security attacks. In this article, we present a …
and classical computer-based adversary security attacks. In this article, we present a …
[HTML][HTML] A scalable montgomery modular multiplication architecture with low area-time product based on redundant binary representation
Z Zhang, P Zhang - Electronics, 2022 - mdpi.com
The Montgomery modular multiplication is an integral operation unit in the public key
cryptographic algorithm system. Previous work achieved good performance at low input …
cryptographic algorithm system. Previous work achieved good performance at low input …
Parameter space for the architecture of FFT-based Montgomery modular multiplication
Modular multiplication is the core operation in public-key cryptographic algorithms such as
RSA and the Diffie-Hellman algorithm. The efficiency of the modular multiplier plays a crucial …
RSA and the Diffie-Hellman algorithm. The efficiency of the modular multiplier plays a crucial …
Efficient modular exponential algorithms compatible with hardware implementation of public‐key cryptography
It is widely recognized that the public‐key cryptosystem is playing a pivotal role to provide
the security services not only in electronic world but also for secured key exchanges in …
the security services not only in electronic world but also for secured key exchanges in …
Energy efficient modular exponentiation for public-key cryptography based on bit forwarding techniques
S Vollala, N Ramasubramanian - Information Processing Letters, 2017 - Elsevier
Modular exponentiation and modular multiplications are two fundamental operations in
various cryptographic applications, and hence the performance of public-key cryptographic …
various cryptographic applications, and hence the performance of public-key cryptographic …
Secure and energy efficient design of multi-modular exponential techniques for public-key cryptosystem
The present paper proposes a secure design of the energy-efficient multi-modular
exponential techniques that use store and reward method and store and forward method …
exponential techniques that use store and reward method and store and forward method …
A novel two-stage modular multiplier based on racetrack memory for asymmetric cryptography
Asymmetric cryptography algorithms such as RSA are widely used in applications such as
blockchain technology and cloud computing to ensure the security and privacy of data …
blockchain technology and cloud computing to ensure the security and privacy of data …
Low‐latency digit‐serial dual basis multiplier for lightweight cryptosystems
CW Chiou, CY Lee, JM Lin, YC Yeh… - IET Information …, 2017 - Wiley Online Library
Various cryptosystems, such as elliptic curve and pairing‐based cryptosystems, in resource‐
constrained security applications rely on finite field multiplication. For applications such as …
constrained security applications rely on finite field multiplication. For applications such as …
A cross-layer key establishment scheme in wireless mesh networks
Cryptographic keys are necessary to secure communications among mesh clients in
wireless mesh networks. Traditional key establishment schemes are implemented at higher …
wireless mesh networks. Traditional key establishment schemes are implemented at higher …
智能卡中非对称算法模幂运算单元的设计与验证
邵佳佳, 乌力吉, 张向民 - 微电子学与计算机, 2015 - journalmc.com
基于CIOS 模乘算法和Montgomery powering ladder 模幂算法, 设计了模幂电路,
能进行密钥长度可配置的模乘, 模幂, 模加和模减运算. 在50 MHz 和SIMC13LL …
能进行密钥长度可配置的模乘, 模幂, 模加和模减运算. 在50 MHz 和SIMC13LL …