How to teach residue number system to computer scientists and engineers

K Navi, AS Molahosseini… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
The residue number system (RNS) has been an important research field in computer
arithmetic for many decades, mainly because of its carry-free nature, which can provide high …

Evaluation of large integer multiplication methods on hardware

C Rafferty, M O'Neill, N Hanley - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Multipliers requiring large bit lengths have a major impact on the performance of many
applications, such as cryptography, digital signal processing (DSP) and image processing …

Improving the computational efficiency of modular operations for embedded systems

I San, N At - Journal of Systems Architecture, 2014 - Elsevier
Security protocols such as IPSec, SSL and VPNs used in many communication systems
employ various cryptographic algorithms in order to protect the data from malicious attacks …

FPGA implementation of IEEE-754 floating point Karatsuba multiplier

RK Kodali, SK Gundabathula… - … Conference on Control …, 2014 - ieeexplore.ieee.org
The floating point arithmetic, specifically multiplication, is a widely used computational
operation in many scientific and signal processing applications. In general, the IEEE-754 …

Modular SIMD arithmetic in Mathemagix

JVD Hoeven, G Lecerf, G Quintin - ACM Transactions on Mathematical …, 2016 - dl.acm.org
Modular integer arithmetic occurs in many algorithms for computer algebra, cryptography,
and error correcting codes. Although recent microprocessors typically offer a wide range of …

Efficient hardware architecture of recursive Karatsuba-Ofman multiplier

M Machhout, M Zeghid, B Bouallegue… - 2008 3rd International …, 2008 - ieeexplore.ieee.org
The finite Field multiplication is the basic operation in all cryptographic applications. It can
be performed by using Serial, Booth, Montgomery and Karatsuba-Ofman's divide-and …

Cryptographically secure pseudo-random bit generator for RFID tags

P Peris-Lopez, E San Millan… - 2010 International …, 2010 - ieeexplore.ieee.org
In RFID protocols, random numbers are mainly required to anonymize tag answers in order
to guarantee the privacy of the owner of the transponder. Our analysis looks at the feasibility …

Determining message residue using a set of polynomials

WC Hasenplaugh, BA Burres, G Gaubatz - US Patent 7,827,471, 2010 - Google Patents
(57) ABSTRACT A method is described for use in determining a residue of a message. The
method includes loading at least a portion of each of a set of polynomials derived from a first …

Design and FPGA prototype of 1024-bit Blum-Blum-Shub PRBG architecture

AK Panda, KC Ray - 2018 IEEE International Conference on …, 2018 - ieeexplore.ieee.org
The necessity of hardware security for internet-of-things applications demands a low
hardware area, high speed and secure pseudorandom bit generator (PRBG). Amongst …

Software/hardware co-design of modular exponentiation for efficient RSA cryptosystem

M Issad, B Boudraa, M Anane… - Journal of Circuits, Systems …, 2014 - World Scientific
This paper presents an implementation of Rivest, Shamir and Adleman (RSA) cryptosystem
based on hardware/software (HW/SW) co-design. The main operation of RSA is the modular …