[PDF][PDF] A review of modular multiplication methods ands respective hardware implementation

N Nedjah, L de Macedo Mourelle - Informatica, 2006 - informatica.si
A Review of Modular Multiplication Methods and Respective Hardware Implementations Page
1 Informatica 30 (2006) 111–129 111 A Review of Modular Multiplication Methods and …

Three hardware architectures for the binary modular exponentiation: sequential, parallel, and systolic

N Nedjah, LM Mourelle - … Transactions on Circuits and Systems I …, 2006 - ieeexplore.ieee.org
Modular exponentiation is the cornerstone computation in public-key cryptography systems
such as RSA cryptosystems. The operation is time consuming for large operands. This paper …

Cryptographically secure pseudo-random bit generator for RFID tags

P Peris-Lopez, E San Millan… - 2010 International …, 2010 - ieeexplore.ieee.org
In RFID protocols, random numbers are mainly required to anonymize tag answers in order
to guarantee the privacy of the owner of the transponder. Our analysis looks at the feasibility …

Massively parallel modular exponentiation method and its implementation in software and hardware for high-performance cryptographic systems

N Nedjah, LM Mourelle, M Santana, S Raposo - IET computers & digital …, 2012 - IET
Most cryptographic systems are based on modular exponentiation (ME). It is performed
using successive modular multiplications (MMs). In this case, there are many ways to …

Efficient montgomery multiplier for pairing and elliptic curve based cryptography

K Javeed, X Wang - 2014 9th International Symposium on …, 2014 - ieeexplore.ieee.org
In this paper, we propose an efficient 256× 256 bit modular multiplier based on Montgomery
reduction algorithm. The 256× 256 bit modular multiplier is required in elliptic curve and …

Efficient hardware for modular exponentiation using the sliding-window method

N Nedjah, L de Macedo Mourelle… - … Technology (ITNG'07), 2007 - ieeexplore.ieee.org
Modular exponentiation is an essential operations for various applications, such as
cryptography. The performance of this operations has a tremendous im-pact on the …

Analyzing and comparing the Montgomery multiplication algorithms for their power consumption

D Bayhan, SB Ors, G Saldamli - The 2010 International …, 2010 - ieeexplore.ieee.org
This study analyses and compares the most popular Montgomery multiplication algorithms
for their power dissipation on FPGA devices. Among various architectures proposed for …

Montgomery modular multiplier architectures and hardware implementations for an RSA cryptosystem

AP Fournaris, O Koufopavlou - 2003 46th Midwest Symposium …, 2003 - ieeexplore.ieee.org
This paper describes and analyses the Montgomery multiplication algorithm and proposes
two scalable, systolic architectures and hardware implementations based on this algorithm …

Fast reconfigurable systolic hardware for modular multiplication and exponentiation

N Nedjah, L de Macedo Mourelle - Journal of systems architecture, 2003 - Elsevier
Modular multiplication and modular exponentiation are fundamental operations in most
public-key cryptosystems such as RSA. In this paper, we propose a novel implementation of …

Hardware implementation of montgomery modular multiplication algorithm using iterative architecture

AP Renardy, N Ahmadi, AA Fadila… - … Technology and Its …, 2015 - ieeexplore.ieee.org
Modular multiplication is an integral part of RSA cryptosystems and its performance heavily
determines the performance of the encryption hardware. This paper provides a hardware …