1991
DOI: 10.1007/3-540-46877-3_21
|View full text |Cite
|
Sign up to set email alerts
|

A Cryptographic Library for the Motorola DSP56000

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
66
0

Year Published

1994
1994
2018
2018

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 106 publications
(66 citation statements)
references
References 17 publications
0
66
0
Order By: Relevance
“…Therefore based on the computational analyses of Montgomery reduction algorithm from [15] for n-bit modulus and k-bit exponent, the following four operations S 1 C 1 mod N, S 1 C 2 mod N, S 1 C 3 mod N and S 1 C 4 mod N require These results are represented graphically in Figure 3. Window width % of improvements Improvement over [2] Improvement over [15] Improvement over [17] Improvement over [16] As it is shown in Table 1 and Figure 3, the proposed modular exponentiation algorithm reduces the multiplication steps considerably.…”
Section: Discussionmentioning
confidence: 99%
“…Therefore based on the computational analyses of Montgomery reduction algorithm from [15] for n-bit modulus and k-bit exponent, the following four operations S 1 C 1 mod N, S 1 C 2 mod N, S 1 C 3 mod N and S 1 C 4 mod N require These results are represented graphically in Figure 3. Window width % of improvements Improvement over [2] Improvement over [15] Improvement over [17] Improvement over [16] As it is shown in Table 1 and Figure 3, the proposed modular exponentiation algorithm reduces the multiplication steps considerably.…”
Section: Discussionmentioning
confidence: 99%
“…Consider following numbers x, y and m in radix b representation with n digits : Montgomery reduction takes an integer a such that 0  a < Rm and yields aR 1 mod m. To compute the Montgomery reduction of the product of two integers x and y, multi-precision multiplication and Montgomery reduction method can be combined efficiently [18]. Montgomery multiplication MontMult(x, y) yields xyR 1 mod m as described in Algorithm MontMult of …”
Section: Montgomery Multiplicationmentioning
confidence: 99%
“…Certificates play an important role in a number of public-key protocols such as PEM [825] (see Section 24.10) and X. 509 [304] (see Section 24.9).…”
Section: Public-key Certificatesmentioning
confidence: 99%
“…Good survey articles are [258,872]. Many different chips perform RSA encryption [1310,252,1101,1317,874,69,737,594,1275,1563,509,1223]. A partial list of currently available RSA chips, from [150,258], is listed in Table 19.3.…”
Section: Rsa In Hardwarementioning
confidence: 99%