Spectral modular exponentiation

G Saldamli, CK Koç - 18th IEEE Symposium on Computer …, 2007 - ieeexplore.ieee.org
We describe a new method to perform the modular exponentiation operation, ie, the
computation of c= me mod n, where c, m, e and n are large integers. The new method uses …

Vertical vergence calibration for augmented reality displays

MA Livingston, SR Ellis, SM White… - IEEE Virtual Reality …, 2006 - ieeexplore.ieee.org
Stereo and bi-ocular head-mounted displays (HMDs) require the user to fuse two images
into a coherent picture of the threedimensional world. The human visual system performs …

Reconfigurable number theoretic transform architectures for cryptographic applications

GX Yao, RCC Cheung, ÇK Koç… - … Conference on Field …, 2010 - ieeexplore.ieee.org
As an important component of Spectral Modular Arithmetic (SMA) cryptographic co-
processor, the efficient architectures of Number Theoretic Transforms (NTTs) on FPGA are …

Low complexity and hardware-friendly spectral modular multiplication

DD Chen, GX Yao, CK Koç… - … Conference on Field …, 2012 - ieeexplore.ieee.org
The Schönhage-Strassen Algorithm (SSA) is an asymptotically fast multiplication algorithm
with the complexity of O (l log l log log l) where l is the operand size. It outperforms other …

[图书][B] Development and Benchmarking of New Hardware Architectures for Emerging Cryptographic Transformations

M Rogawski - 2013 - search.proquest.com
Cryptography is a very active branch of science. Due to the everlasting struggle between
cryptographers, designing new algorithms, and cryptanalysts, attempting to break them, the …

Reducing the complexity of normal basis multiplication

Ö Eǧecioǧlu, ÇK Koç - International Workshop on the Arithmetic of Finite …, 2014 - Springer
In this paper we introduce a new transformation method and a multiplication algorithm for
multiplying the elements of the field GF (2^ k) expressed in a normal basis. The number of …

A high-performance hardware architecture for spectral hash algorithm

RCC Cheung, ÇK Koc… - 2009 20th IEEE …, 2009 - ieeexplore.ieee.org
The spectral hash algorithm is one of the round 1 candidates for the SHA-3 family, and is
based on spectral arithmetic over a finite field, involving multidimensional discrete Fourier …

Spectral modular arithmetic for binary extension fields

G Saldamli, YJ Baek, CK Koc - 2011 IEEE 3rd International …, 2011 - ieeexplore.ieee.org
We describe a method of carrying multiplication in the binary extension fields. The new
method fully operates on the Fourier representations of the field elements by successively …

Spectral modular arithmetic for cryptography

G Saldamli, CK Koç - Cryptographic Engineering, 2009 - Springer
Most public-key cryptosystems require resource-intensive arithmetic calculations in certain
mathematical structures such as finite fields, groups, and rings. The efficient realizations of …

[PDF][PDF] An efficient hardware architecture for spectral hash algorithm

RCC Cheung, CK Koç, JD Villasenor - Submitted to ASAP, 2009 - researchgate.net
Abstract The Spectral Hash algorithm is one of the Round 1 candidates for the SHA-3 family,
and is based on spectral arithmetic over a finite field, involving multidimensional discrete …