An RNS Implementation of an Elliptic Curve Point Multiplier

DM Schinianakis, AP Fournaris… - … on Circuits and …, 2008 - ieeexplore.ieee.org
Elliptic curve point multiplication is considered to be the most significant operation in all
elliptic curve cryptography systems, as it forms the basis of the elliptic curve discrete …

Montgomery reduction within the context of residue number system arithmetic

JC Bajard, J Eynard, N Merkiche - Journal of Cryptographic Engineering, 2018 - Springer
This paper is a survey of Montgomery reduction in the context of residue number system
arithmetic. We present the main variants of RNS Montgomery reduction, some efficient …

Exploiting residue number system for power-efficient digital signal processing in embedded processors

R Chokshi, KS Berezowski, A Shrivastava… - Proceedings of the …, 2009 - dl.acm.org
2's complement number system imposes a fundamental limitation on the power and
performance of arithmetic circuits, due to the fundamental need of cross-datapath carry …

New distributed algorithms for fast sign detection in residue number systems (RNS)

DS Phatak, SD Houston - Journal of Parallel and Distributed Computing, 2016 - Elsevier
We identify a canonical parameter in the Chinese Remainder Theorem (CRT) and call it the
“Reconstruction Coefficient”,(denoted by “RC”); and introduce the notions of “Partial” and …

Combining leak-resistant arithmetic for elliptic curves defined over and RNS representation

JC Bajard, S Duquesne… - … . Algèbre et théorie …, 2013 - pmb.centre-mersenne.org
In this paper we give a survey of a method combining the residue number system (RNS)
representation and the leak-resistant arithmetic on elliptic curves. These two techniques are …

Improving the arithmetic of elliptic curves in the Jacobi model

S Duquesne - Information Processing Letters, 2007 - Elsevier
The use of elliptic curve cryptosystems on embedded systems has been becoming
widespread for some years. Therefore the resistance of such cryptosystems to side-channel …

Acceleration of composite order bilinear pairing on graphics hardware

Y Zhang, CJ Xue, DS Wong, N Mamoulis… - … Security: 14th International …, 2012 - Springer
Recently, composite-order bilinear pairing has been shown to be useful in many
cryptographic constructions. However, it is time-costly to evaluate. This is because the …

RNS arithmetic in 𝔽pk and application to fast pairing computation

S Duquesne - Journal of Mathematical Cryptology, 2011 - degruyter.com
In this work, we are interested in arithmetic on large prime field and their extensions of small
degree. We explain why it is very interesting to use RNS arithmetic for the base field 𝔽 p …

Radix-4 interleaved modular multiplication for cryptographic applications

T Kudithi, M Potdar, R Sakthivel - … International Conference on …, 2019 - ieeexplore.ieee.org
Modular arithmetic based processors are widely used in digital signal processing, image
processing, cryptography, etc. All major crypto-systems require the use of modular …

Babai round-off CVP method in RNS: Application to lattice based cryptographic protocols

JC Bajard, J Eynard, N Merkiche… - … on Integrated Circuits …, 2014 - ieeexplore.ieee.org
Lattice based cryptography is claimed as a serious candidate for post quantum
cryptography, it recently became an essential tool of modern cryptography. Nevertheless, if …