Sciweavers

93 search results - page 2 / 19
» Applications of The Montgomery Exponent
Sort
View
ISVLSI
2002
IEEE
104views VLSI» more  ISVLSI 2002»
13 years 10 months ago
Scalable VLSI Architecture for GF(p) Montgomery Modular Inverse Computation
Modular inverse computation is needed in several public key cryptographic applications. In this work, we present two VLSI hardware implementations used in the calculation of Montg...
Adnan Abdul-Aziz Gutub, Alexandre F. Tenca, &Ccedi...
FPL
2010
Springer
180views Hardware» more  FPL 2010»
13 years 3 months ago
A Karatsuba-Based Montgomery Multiplier
Abstract--Modular multiplication of long integers is an important building block for cryptographic algorithms. Although several FPGA accelerators have been proposed for large modul...
Gary Chun Tak Chow, Ken Eguro, Wayne Luk, Philip L...
PKC
2010
Springer
138views Cryptology» more  PKC 2010»
13 years 9 months ago
Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA
We present an elementary method to construct optimized lattices that are used for finding small roots of polynomial equations. Former methods first construct some large lattice i...
Mathias Herrmann, Alexander May
PKC
2005
Springer
144views Cryptology» more  PKC 2005»
13 years 10 months ago
RSA with Balanced Short Exponents and Its Application to Entity Authentication
In typical RSA, it is impossible to create a key pair (e, d) such that both are simultaneously much shorter than φ(N). This is because if d is selected first, then e will be of t...
Hung-Min Sun, Cheng-Ta Yang
ISCAS
1999
IEEE
93views Hardware» more  ISCAS 1999»
13 years 9 months ago
Problems of computing Lyapunov exponents in power electronics
Ideal power converters are governed by differential equations with discontinuous right-hand sides. General-purpose algorithms to compute their Lyapunov exponents assume smooth equ...
Y. H. Lim, D. C. Hamill