[图书][B] Residue Number Systems
PVA Mohan, PVA Mohan - 2016 - Springer
The design of algorithms and hardware implementation for signal processing systems has
received considerable attention over the last few decades. The primary area of application …
received considerable attention over the last few decades. The primary area of application …
High-speed polynomial multiplication architecture for ring-LWE and SHE cryptosystems
Polynomial multiplication is the basic and most computationally intensive operation in ring-
learning with errors (ring-LWE) encryption and" somewhat" homomorphic encryption (SHE) …
learning with errors (ring-LWE) encryption and" somewhat" homomorphic encryption (SHE) …
Energy-efficient high-throughput Montgomery modular multipliers for RSA cryptosystems
SR Kuang, JP Wang, KC Chang… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Modular exponentiation in the Rivest, Shamir, and Adleman cryptosystem is usually
achieved by repeated modular multiplications on large integers. To speed up the …
achieved by repeated modular multiplications on large integers. To speed up the …
High-throughput modular multiplication and exponentiation algorithms using multibit-scan–multibit-shift technique
A Rezai, P Keshavarzi - IEEE Transactions on Very Large Scale …, 2014 - ieeexplore.ieee.org
Modular exponentiation with a large modulus and exponent is a fundamental operation in
many public-key cryptosystems. This operation is usually accomplished by repeating …
many public-key cryptosystems. This operation is usually accomplished by repeating …
Architecture optimizations for the RSA public key cryptosystem: A tutorial
The Rivest Shamir Adleman (RSA) cryptosystem, named after its creators, is one of the most
popular public key cryptosystems. The RSA cryptosystem has been utilized for e-commerce …
popular public key cryptosystems. The RSA cryptosystem has been utilized for e-commerce …
Efficient digit‐serial modular multiplication algorithm on FPGA
JS Pan, P Song, CS Yang - IET Circuits, Devices & Systems, 2018 - Wiley Online Library
For cryptographic applications, such as DSA, RSA and ECC systems, the crypto‐processors
are required to perform modular multiplication (MM) on large integers over Galois field. A …
are required to perform modular multiplication (MM) on large integers over Galois field. A …
Advanced implementation of montgomery modular multiplier
AAH Abd-Elkader, M Rashdan, ESAM Hasaneen… - Microelectronics …, 2020 - Elsevier
This paper presents an advanced hardware implementation of Modular Multiplication based
on Montgomery Modular Multiplier (MMM) architecture. The proposed algorithm is a …
on Montgomery Modular Multiplier (MMM) architecture. The proposed algorithm is a …
基于NB-IoT 的农产品原产地可信溯源系统设计与实现.
马腾, 孙传恒, 李文勇, 陈明… - Journal of Agricultural …, 2019 - search.ebscohost.com
随着人们对农产品企业品牌认知程度的提高, 鉴别农产品产地的防伪系统对于维护消费者权益和
提高企业竞争力具有重要意义. 为保障食品安全, 维护农产品生产者利益和消费者权益 …
提高企业竞争力具有重要意义. 为保障食品安全, 维护农产品生产者利益和消费者权益 …
High-performance scalable architecture for modular multiplication using a new digit-serial computation
A Rezai, P Keshavarzi - Microelectronics journal, 2016 - Elsevier
Modular multiplication with a large modulus plays a vital role in many Public-Key
Cryptosystems (PKCs) such as RSA and Elliptic Curve Cryptosystem (ECC). Montgomery …
Cryptosystems (PKCs) such as RSA and Elliptic Curve Cryptosystem (ECC). Montgomery …
Design of RSA processor for concurrent cryptographic transformations
The performance of RSA depends strongly on the competent implementation of modular
multiplication and modular exponentiation. Performance can be improved in three ways:(i) …
multiplication and modular exponentiation. Performance can be improved in three ways:(i) …