2006
DOI: 10.15388/informatica.2006.148
|View full text |Cite
|
Sign up to set email alerts
|

Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem

Abstract: We know the necessity for information security becomes more widespread in these days, especially for hardware-based implementations such as smart cards chips for wireless applications and cryptographic accelerators. Fast modular exponentiation algorithms are often considered of practical significance in public-key cryptosystems. The RSA cryptosystem is one of the most widely used technologies for achieving information security. The main task of the encryption and decryption engine of RSA cryptosystem is to com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…The present work is in line with what has been done for parallel exponentiation [4,5,1,3,6]. We consider hash tree modes using a rate-1 hash (or compression) function, i.e.…”
Section: Introductionmentioning
confidence: 63%
“…The present work is in line with what has been done for parallel exponentiation [4,5,1,3,6]. We consider hash tree modes using a rate-1 hash (or compression) function, i.e.…”
Section: Introductionmentioning
confidence: 63%
“…Thereafter in 2004, Chia-Long Wu et al presented "Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem" [8]. In this paper they proposed an efficient technique for parallel computation of modular exponentiation where they get the speedup of 1.06 to 2.75.…”
Section: Sh Tang Et Al Presented "Modular Exponentiation Using Parall...mentioning
confidence: 99%
“…While we focus on the case of trees having all their leaves at the same depth, we are interested in minimizing the depth (parallel time) of the circuit and the width (number of processors involved). This kind of work has been done for parallel exponentiation in finite fields [32,34,1,22,36] where the multiplication operator is both associative and commutative. In the case of parallel hashing, the considered operator can be a FIL (Fixed-Input Length) compression function.…”
Section: Introductionmentioning
confidence: 99%