New RSA encryption mechanism using one-time encryption keys and unpredictable bio-signal for wireless communication devices

H Yu, Y Kim - Electronics, 2020 - mdpi.com
Applying the data encryption method used in conventional personal computers (PC) to
wireless communication devices such as IoT is not trivial. Because IoT equipment is …

Implementation of a 32-Bit RISC-V Processor with Cryptography Accelerators on FPGA and ASIC

DT Nguyen-Hoang, KM Ma, DL Le… - 2022 IEEE Ninth …, 2022 - ieeexplore.ieee.org
This paper describes the use of a combination of hardware construction languages
SpinalHDL and Verilog HDL to implement a 32-bit Linux-capable RISC-V processor with …

Fast and area efficient implementation of RSA algorithm

SD Thabah, M Sonowal, RU Ahmed, P Saha - Procedia Computer Science, 2019 - Elsevier
Efficient hardware implementations of public-key cryptosystems have been gaining interest
in the past few decades. To achieve the goal, a high frequency as well as low latency Rivest …

Multi-Prime RSA Verilog Implementation Using 4-Primes

TD Pathirage, H Wijewardana… - … on Information and …, 2021 - ieeexplore.ieee.org
In this paper, we present a new method to perform RivestShamirAdleman (RSA) key
generation and decryption using FPGA. Multi-prime RSA uses more than two primes for …

[PDF][PDF] HYBRID ENCRYPTION ALGORITHM BASED ON SYMMETRIC AND ASYMMETRIC CIPHERS

NAZBM ZULKIMI - 2021 - eprints.utm.my
In trusted computing architecture, security is one of crucial aspects to protect the design
against hardware or software attacks. The symmetric encryption method works great for fast …

[PDF][PDF] Efficient ASIC Architecture of RSA Cryptosystem

V Nehru, HS Jattana - … of the Fourth International Conference on …, 2014 - csitcp.com
This paper presents a unified architecture design of the RSA cryptosystem ie RSA
cryptoaccelerator along with key-pair generation. A structural design methodology for the …

Մոդուլյար թվաբանության բլոկում թվաբանական սարքերի նախագծման մեթոդների մշակում և հետազոտում/Developing and investigating methods for …

ԱԿ Սաղաթելյան - 2015 - dspace.nla.am
Ատենախոսությունը նվիրված է մոդուլյար թվաբանության կիրառմամբ բարդ
ֆունկցիոնալ բլոկների (ԲՖ բլոկներ) նախագծման մեթոդների մշակմանը և …

VLSI Implementation of RSA Encryption/Decryption Algorithm

R Rasu, P Shanmugasundaram - i-Manager's Journal on …, 2014 - search.proquest.com
The RSA system is widely employed in networking applications for good performance and
high security. It supports the multiple key sizes like 128 bits, 256 bits, 512 bits. In this paper …