2002
DOI: 10.1002/scj.1122
|View full text |Cite
|
Sign up to set email alerts
|

Design of a high‐speed RSA encryption processor based on the residue table for redundant binary numbers

Abstract: SUMMARYThe RSA cryptosystem plays an important role in ensuring the security of network communications, although it has the drawback that much time is required for encryption/decryption. This paper presents a high-speed RSA encryption processor employing highly parallel operation based as much as possible in the hardware technology as follows: (1) All of the arithmetic circuits required for encryption/decryption are implemented in the form of redundant binary numbers. (2) Residue calculation is performed by ta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…Real-time services (RTS) such as video on demand (VOD), high-definition television (HDTV) and video conferencing with so a small delay requirement than safety that the simplest possible security encryption algorithms should be chosen like DES, 3DES [9,10] General data services (GDS) including web browsing, uploading and downloading and FTP with relatively modest requirements for the quality of service (QoS) and safety, so the encryption algorithm selected can be moderate in complexity and security as well as reducing consumption like RSA, AES [11][12][13][14][15] Confidential data services (CDS) , a relatively low proportion of traffic , are characterized by a low latency but a high security requirements such as carry-key information of control frame in…”
Section: Related Workmentioning
confidence: 99%
“…Real-time services (RTS) such as video on demand (VOD), high-definition television (HDTV) and video conferencing with so a small delay requirement than safety that the simplest possible security encryption algorithms should be chosen like DES, 3DES [9,10] General data services (GDS) including web browsing, uploading and downloading and FTP with relatively modest requirements for the quality of service (QoS) and safety, so the encryption algorithm selected can be moderate in complexity and security as well as reducing consumption like RSA, AES [11][12][13][14][15] Confidential data services (CDS) , a relatively low proportion of traffic , are characterized by a low latency but a high security requirements such as carry-key information of control frame in…”
Section: Related Workmentioning
confidence: 99%