A resource efficient software-hardware co-design of lattice-based homomorphic encryption scheme on the FPGA

B Paul, TK Yadav, B Singh… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Lattice-based homomorphic encryption schemes provide strong resistance against quantum
and classical computer-based adversary security attacks. In this article, we present a …

[HTML][HTML] A scalable montgomery modular multiplication architecture with low area-time product based on redundant binary representation

Z Zhang, P Zhang - Electronics, 2022 - mdpi.com
The Montgomery modular multiplication is an integral operation unit in the public key
cryptographic algorithm system. Previous work achieved good performance at low input …

Parameter space for the architecture of FFT-based Montgomery modular multiplication

DD Chen, GX Yao, RCC Cheung… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Modular multiplication is the core operation in public-key cryptographic algorithms such as
RSA and the Diffie-Hellman algorithm. The efficiency of the modular multiplier plays a crucial …

Efficient modular exponential algorithms compatible with hardware implementation of public‐key cryptography

S Vollala, K Geetha… - Security and …, 2016 - Wiley Online Library
It is widely recognized that the public‐key cryptosystem is playing a pivotal role to provide
the security services not only in electronic world but also for secured key exchanges in …

Energy efficient modular exponentiation for public-key cryptography based on bit forwarding techniques

S Vollala, N Ramasubramanian - Information Processing Letters, 2017 - Elsevier
Modular exponentiation and modular multiplications are two fundamental operations in
various cryptographic applications, and hence the performance of public-key cryptographic …

Secure and energy efficient design of multi-modular exponential techniques for public-key cryptosystem

U Tiwari, S Vollala… - Journal of …, 2022 - ieeexplore.ieee.org
The present paper proposes a secure design of the energy-efficient multi-modular
exponential techniques that use store and reward method and store and forward method …

A novel two-stage modular multiplier based on racetrack memory for asymmetric cryptography

T Luo, B He, W Zhang… - 2017 IEEE/ACM …, 2017 - ieeexplore.ieee.org
Asymmetric cryptography algorithms such as RSA are widely used in applications such as
blockchain technology and cloud computing to ensure the security and privacy of data …

Low‐latency digit‐serial dual basis multiplier for lightweight cryptosystems

CW Chiou, CY Lee, JM Lin, YC Yeh… - IET Information …, 2017 - Wiley Online Library
Various cryptosystems, such as elliptic curve and pairing‐based cryptosystems, in resource‐
constrained security applications rely on finite field multiplication. For applications such as …

A cross-layer key establishment scheme in wireless mesh networks

Y Zhang, Y Xiang, X Huang, L Xu - … 7-11, 2014. Proceedings, Part I 19, 2014 - Springer
Cryptographic keys are necessary to secure communications among mesh clients in
wireless mesh networks. Traditional key establishment schemes are implemented at higher …

智能卡中非对称算法模幂运算单元的设计与验证

邵佳佳, 乌力吉, 张向民 - 微电子学与计算机, 2015 - journalmc.com
基于CIOS 模乘算法和Montgomery powering ladder 模幂算法, 设计了模幂电路,
能进行密钥长度可配置的模乘, 模幂, 模加和模减运算. 在50 MHz 和SIMC13LL …