Proceedings of IEEE 11th Symposium on Computer Arithmetic
DOI: 10.1109/arith.1993.378085
|View full text |Cite
|
Sign up to set email alerts
|

Fast implementations of RSA cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
87
0
1

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 164 publications
(88 citation statements)
references
References 11 publications
0
87
0
1
Order By: Relevance
“…In order to keep the transponder cheap, low power and small, one of our design criteria was to avoid the use of expensive cryptographic operations (remembering that computing a modular exponentiation is O(n 2 ) in hardware [Shand and Vuillemin, 1993]), thus, we have not offered a protocol involving the merchant.…”
Section: Discussionmentioning
confidence: 99%
“…In order to keep the transponder cheap, low power and small, one of our design criteria was to avoid the use of expensive cryptographic operations (remembering that computing a modular exponentiation is O(n 2 ) in hardware [Shand and Vuillemin, 1993]), thus, we have not offered a protocol involving the merchant.…”
Section: Discussionmentioning
confidence: 99%
“…B' := B' + 1 2b. P := ( P + A ) mod n 3. return P There are basically four general approaches for computing the product P [12][13][14][15]: Multiply and then divide, Interleaving multiplication and reduction, Brickell's method and Montgomery's method. All approaches above have a common disadvantage that it doubles up the number of bits for each multiplication and hence a large register is needed to store this result.…”
Section: B Shared Key Generatormentioning
confidence: 99%
“…Montgomery's algorithm needs n iterations in each modular multiplication and two additions per iteration, where n is the word length. Cellular arrays based on Montgomery's algorithm can be found in [6][7][8]. In this algorithm, odd modulus is assumed.…”
Section: Introductionmentioning
confidence: 99%