2013 IEEE 16th International Symposium on Design and Diagnostics of Electronic Circuits &Amp; Systems (DDECS) 2013
DOI: 10.1109/ddecs.2013.6549784
|View full text |Cite
|
Sign up to set email alerts
|

Area-speed efficient modular architecture for GF(2<sup>m</sup>) multipliers dedicated for cryptographic applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…Beuchat [24] concluded that the MSE first approach requires less hardware and offers higher throughput than LSE. In [28], the reduction steps are performed separately. It is stated that for a finite field generated by irreducible polynomials FðxÞ (NIST [29]), reduction can be performed by a set of xor operations [30,31].…”
Section: Elliptic Curves and Its Use In Cryptographymentioning
confidence: 99%
See 1 more Smart Citation
“…Beuchat [24] concluded that the MSE first approach requires less hardware and offers higher throughput than LSE. In [28], the reduction steps are performed separately. It is stated that for a finite field generated by irreducible polynomials FðxÞ (NIST [29]), reduction can be performed by a set of xor operations [30,31].…”
Section: Elliptic Curves and Its Use In Cryptographymentioning
confidence: 99%
“…It is stated that for a finite field generated by irreducible polynomials FðxÞ (NIST [29]), reduction can be performed by a set of xor operations [30,31]. [28] is considered only the multiplication step, implemented in a digitserial approach. A digit D = 16 is proposed since in most cases, 16-bit words give better results.…”
Section: Elliptic Curves and Its Use In Cryptographymentioning
confidence: 99%