Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00)
DOI: 10.1109/acsac.2000.898893
|View full text |Cite
|
Sign up to set email alerts
|

The Chinese Remainder Theorem and its application in a high-speed RSA crypto chip

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…Accompanying with growth of sports professionals demand, the structural differences emerged in Cultivation of Sports Talent and the employment process in our society need to be resolved. To find the causes of the structural differences by establishing training mode for sports talents based on system dynamics is the most important issue [3] . First, the main source of sports professionals is university, and sports professionals cultivated by community only account for a small proportion [4] .…”
Section: The Principle Of the Simulation Model For Personnel Trainingmentioning
confidence: 99%
“…Accompanying with growth of sports professionals demand, the structural differences emerged in Cultivation of Sports Talent and the employment process in our society need to be resolved. To find the causes of the structural differences by establishing training mode for sports talents based on system dynamics is the most important issue [3] . First, the main source of sports professionals is university, and sports professionals cultivated by community only account for a small proportion [4] .…”
Section: The Principle Of the Simulation Model For Personnel Trainingmentioning
confidence: 99%
“…Großschädl proposed an algorithm for RSA decryption by Chinese Remainder Theorem which can half the length of operands and be implemented in a hardware core [7]. Our work carries forward with his algorithm a further step by implementing CRT-based RSA decryption on the FPGA.…”
Section: Related Workmentioning
confidence: 99%
“…An example of the utilization of CRT is presented by Grosschädl in [7]. In this paper the multiplier architecture of an RSA chip is presented.…”
Section: Previous Workmentioning
confidence: 99%