2019
DOI: 10.1016/j.procs.2020.01.024
|View full text |Cite
|
Sign up to set email alerts
|

Fast and Area Efficient Implementation of RSA Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 9 publications
0
0
0
Order By: Relevance
“…And the private key is kept only by the owner of the key. There are three major steps in the RSA algorithm, key generation, encryption, and decryption [14,15].…”
Section: Detail Of Designmentioning
confidence: 99%
“…And the private key is kept only by the owner of the key. There are three major steps in the RSA algorithm, key generation, encryption, and decryption [14,15].…”
Section: Detail Of Designmentioning
confidence: 99%
“…To the best of our knowledge, there has not yet been any significant research on specific hardware implementations of M-PKE schemes. Nevertheless, hardware implementations of classical asymmetric schemes (e.g., [55][56][57][58]) and asymmetric PQC encryption schemes already exist (e.g., [59,60]). Combining and utilizing the efficiency and speedup of these existing hardware implementations in future research will be useful to enhance M-PKE schemes further, especially for computationally constrained devices.…”
Section: Future Directionsmentioning
confidence: 99%