2012
DOI: 10.1109/tc.2012.84
|View full text |Cite
|
Sign up to set email alerts
|

An Algorithmic and Architectural Study on Montgomery Exponentiation in RNS

Abstract: International audienceThe modular exponentiation on large numbers is computationally intensive. An effective way for performing this operation consists in using Montgomery exponentiation in the Residue Number System (RNS). This paper presents an algorithmic and architectural study of such exponentiation approach. From the algorithmic point of view, new and state-of-the-art opportunities that come from the reorganization of operations and precomputations are considered. From the architectural perspective, the d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
50
0
1

Year Published

2013
2013
2020
2020

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 40 publications
(52 citation statements)
references
References 12 publications
1
50
0
1
Order By: Relevance
“…2) [28,25,18], and those using an intermediate representation called mixed radix system (MRS) [30,7,3]. In hardware, the most efficient BE implementations in state-of-art use the CRT based solution [12,14]. Our proposed modular multiplication algorithm can be used with both types of BE algorithm.…”
Section: Base Extensionmentioning
confidence: 99%
See 1 more Smart Citation
“…2) [28,25,18], and those using an intermediate representation called mixed radix system (MRS) [30,7,3]. In hardware, the most efficient BE implementations in state-of-art use the CRT based solution [12,14]. Our proposed modular multiplication algorithm can be used with both types of BE algorithm.…”
Section: Base Extensionmentioning
confidence: 99%
“…The modular multiplication, one of the most important arithmetic operation in asymmetric cryptography, is significantly more costly than a simple multiplication. Thus, many algorithms and optimizations have been proposed for RNS modular multiplication, see [26,1,18,2,14,24,12,9,27].…”
Section: Introductionmentioning
confidence: 99%
“…Full RSA in RNS implementations can be found in [23,2,21]. As far as we know, the best RNS exponentiation algorithm is described in [12]. It introduces a new representation in the second base B which provides faster modular reduction.…”
Section: Notations and Definitionsmentioning
confidence: 99%
“…This method has been used for hardware RNS inversion in cryptographic applications [14,7]. In [12], a modular exponentiation algorithm has been proposed. Using the same property, it can be used to compute modular inversion.…”
Section: Modular Inversionmentioning
confidence: 99%
See 1 more Smart Citation