Energy-efficient high-throughput Montgomery modular multipliers for RSA cryptosystems

SR Kuang, JP Wang, KC Chang… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Modular exponentiation in the Rivest, Shamir, and Adleman cryptosystem is usually
achieved by repeated modular multiplications on large integers. To speed up the …

[BOOK][B] Wireless security and cryptography: specifications and implementations

N Sklavos, M Manninger, X Zhang, O Koufopavlou… - 2017 - taylorfrancis.com
As the use of wireless devices becomes widespread, so does the need for strong and
secure transport protocols. Even with this intensified need for securing systems, using …

High-throughput modular multiplication and exponentiation algorithms using multibit-scan–multibit-shift technique

A Rezai, P Keshavarzi - IEEE Transactions on Very Large Scale …, 2014 - ieeexplore.ieee.org
Modular exponentiation with a large modulus and exponent is a fundamental operation in
many public-key cryptosystems. This operation is usually accomplished by repeating …

A new modular exponentiation architecture for efficient design of RSA cryptosystem

MD Shieh, JH Chen, HH Wu… - IEEE Transactions on Very …, 2008 - ieeexplore.ieee.org
Modular exponentiation with a large modulus, which is usually accomplished by repeated
modular multiplications, has been widely used in public key cryptosystems for secured data …

Modular multiplication and exponentiation architectures for fast RSA cryptosystem based on digit serial computation

GD Sutter, JP Deschamps… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Modular exponentiation with large modulus and exponent, which is usually accomplished by
repeated modular multiplications, has been widely used in public key cryptosystems …

An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1

MLM Kiah, MS Nabi, BB Zaidan, AA Zaidan - Journal of medical systems, 2013 - Springer
This study aims to provide security solutions for implementing electronic medical records
(EMRs). E-Health organizations could utilize the proposed method and implement …

Parametric, secure and compact implementation of RSA on FPGA

E Oksuzoglu, E Savas - 2008 International Conference on …, 2008 - ieeexplore.ieee.org
We present a fast, efficient, and parameterized modular multiplier and a secure
exponentiation circuit especially intended for FPGAs on the low end of the price range. The …

Compact SD: A new encoding algorithm and its application in multiplication

A Rezai, P Keshavarzi - International journal of computer …, 2017 - Taylor & Francis
This paper presents and evaluates a compact Signed-Digit (SD) encoding algorithm which
is an efficient class of the large integer encoding algorithms. The compact SD algorithm …

Fault and simple power attack resistant RSA using Montgomery modular multiplication

AP Fournaris - … of 2010 IEEE International Symposium on …, 2010 - ieeexplore.ieee.org
Side channel attacks and more specifically fault, simple power attacks, constitute a
pragmatic, potent mean of braking a cryptographic algorithm like RSA. For this reason, many …

Differential power analysis resistant hardware implementation of the RSA cryptosystem

KA Bayam, B ÖRS - Turkish Journal of Electrical Engineering …, 2010 - journals.tubitak.gov.tr
In this paper, RSA cryptosystem was implemented on hardware, then modified to be
resistant against Differential Power Analysis attacks by using the Randomized Table …