Energy-efficient high-throughput Montgomery modular multipliers for RSA cryptosystems
SR Kuang, JP Wang, KC Chang… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Modular exponentiation in the Rivest, Shamir, and Adleman cryptosystem is usually
achieved by repeated modular multiplications on large integers. To speed up the …
achieved by repeated modular multiplications on large integers. To speed up the …
[BOOK][B] Wireless security and cryptography: specifications and implementations
As the use of wireless devices becomes widespread, so does the need for strong and
secure transport protocols. Even with this intensified need for securing systems, using …
secure transport protocols. Even with this intensified need for securing systems, using …
High-throughput modular multiplication and exponentiation algorithms using multibit-scan–multibit-shift technique
Modular exponentiation with a large modulus and exponent is a fundamental operation in
many public-key cryptosystems. This operation is usually accomplished by repeating …
many public-key cryptosystems. This operation is usually accomplished by repeating …
A new modular exponentiation architecture for efficient design of RSA cryptosystem
MD Shieh, JH Chen, HH Wu… - IEEE Transactions on Very …, 2008 - ieeexplore.ieee.org
Modular exponentiation with a large modulus, which is usually accomplished by repeated
modular multiplications, has been widely used in public key cryptosystems for secured data …
modular multiplications, has been widely used in public key cryptosystems for secured data …
Modular multiplication and exponentiation architectures for fast RSA cryptosystem based on digit serial computation
GD Sutter, JP Deschamps… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Modular exponentiation with large modulus and exponent, which is usually accomplished by
repeated modular multiplications, has been widely used in public key cryptosystems …
repeated modular multiplications, has been widely used in public key cryptosystems …
An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1
This study aims to provide security solutions for implementing electronic medical records
(EMRs). E-Health organizations could utilize the proposed method and implement …
(EMRs). E-Health organizations could utilize the proposed method and implement …
Parametric, secure and compact implementation of RSA on FPGA
E Oksuzoglu, E Savas - 2008 International Conference on …, 2008 - ieeexplore.ieee.org
We present a fast, efficient, and parameterized modular multiplier and a secure
exponentiation circuit especially intended for FPGAs on the low end of the price range. The …
exponentiation circuit especially intended for FPGAs on the low end of the price range. The …
Compact SD: A new encoding algorithm and its application in multiplication
This paper presents and evaluates a compact Signed-Digit (SD) encoding algorithm which
is an efficient class of the large integer encoding algorithms. The compact SD algorithm …
is an efficient class of the large integer encoding algorithms. The compact SD algorithm …
Fault and simple power attack resistant RSA using Montgomery modular multiplication
AP Fournaris - … of 2010 IEEE International Symposium on …, 2010 - ieeexplore.ieee.org
Side channel attacks and more specifically fault, simple power attacks, constitute a
pragmatic, potent mean of braking a cryptographic algorithm like RSA. For this reason, many …
pragmatic, potent mean of braking a cryptographic algorithm like RSA. For this reason, many …
Differential power analysis resistant hardware implementation of the RSA cryptosystem
KA Bayam, B ÖRS - Turkish Journal of Electrical Engineering …, 2010 - journals.tubitak.gov.tr
In this paper, RSA cryptosystem was implemented on hardware, then modified to be
resistant against Differential Power Analysis attacks by using the Randomized Table …
resistant against Differential Power Analysis attacks by using the Randomized Table …