+

Chiou et al., 2017 - Google Patents

Gaussian normal basis multiplier over GF (2m) using hybrid subquadratic‐and‐quadratic TMVP approach for elliptic curve cryptography

Chiou et al., 2017

View PDF @Full View
Document ID
16824635451216642572
Author
Chiou C
Sun Y
Lee C
Lin J
Chuang T
Lee C
Publication year
Publication venue
IET Circuits, Devices & Systems

External Links

Snippet

In recent years, subquadratric‐and‐quadratric Toeplitz matrix–vector product (TMVP) computations are widely used for the implementation of binary field multiplication in elliptic curve cryptography. Pure subquadratric TMVP structure involves significantly less space …
Continue reading at ietresearch.onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/60Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
    • G06F7/72Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
    • G06F7/724Finite field arithmetic
    • G06F7/726Inversion; Reciprocal calculation; Division of elements of a finite field
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/38Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
    • G06F7/48Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices
    • G06F7/52Multiplying; Dividing
    • G06F7/523Multiplying only
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/38Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
    • G06F7/48Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices
    • G06F7/50Adding; Subtracting
    • G06F7/505Adding; Subtracting in bit-parallel fashion, i.e. having a different digit-handling circuit for each denomination
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • HELECTRICITY
    • H03BASIC ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/03Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
    • H03M13/05Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • HELECTRICITY
    • H03BASIC ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/37Decoding methods or techniques, not specific to the particular type of coding provided for in groups H03M13/03 - H03M13/35
    • H03M13/39Sequence estimation, i.e. using statistical methods for the reconstruction of the original codes
    • H03M13/3966Sequence estimation, i.e. using statistical methods for the reconstruction of the original codes based on architectures providing a highly parallelized implementation, e.g. based on systolic arrays

Similar Documents

Publication Publication Date Title
Pan et al. Novel systolization of subquadratic space complexity multipliers based on toeplitz matrix–vector product approach
Hossain et al. High‐performance elliptic curve cryptography processor over NIST prime fields
Lee et al. Low-complexity bit-parallel systolic Montgomery multipliers for special classes of GF (2/sup m/)
Imran et al. Throughput/area optimised pipelined architecture for elliptic curve crypto processor
Asif et al. High‐throughput multi‐key elliptic curve cryptosystem based on residue number system
Rashidi et al. High‐performance and high‐speed implementation of polynomial basis itoh–tsujii inversion algorithm over GF (2m)
Rashidi et al. Efficient and low‐complexity hardware architecture of Gaussian normal basis multiplication over GF (2m) for elliptic curve cryptosystems
Yan Hua et al. Low space‐complexity digit‐serial dual basis systolic multiplier over Galois field GF (2m) using Hankel matrix and Karatsuba algorithm
Morales‐Sandoval et al. Scalable GF (p) Montgomery multiplier based on a digit–digit computation approach
Pan et al. Efficient digit‐serial modular multiplication algorithm on FPGA
Mathe et al. Design and Implementation of a Sequential Polynomial Basis Multiplier over GF (2m).
Mathe et al. Bit‐parallel systolic multiplier over for irreducible trinomials with ASIC and FPGA implementations
Hu et al. A high speed processor for elliptic curve cryptography over NIST prime field
Shah et al. LUT‐based high‐speed point multiplier for Goldilocks‐Curve448
Rashidi Efficient and flexible hardware structures of the 128 bit CLEFIA block cipher
Fatemi et al. Efficient implementation of digit‐serial Montgomery modular multiplier architecture
Rashidi Throughput/area efficient implementation of scalable polynomial basis multiplication
Petra et al. A novel architecture for galois fields GF (2^ m) multipliers based on mastrovito scheme
Chen et al. FPGA realization of low register systolic all-one-polynomial multipliers over $ GF (2^{m}) $ and their applications in trinomial multipliers
Azarderakhsh et al. High-performance two-dimensional finite field multiplication and exponentiation for cryptographic applications
Lee Low-latency bit-parallel systolic multiplier for irreducible x m+ x n+ 1 with gcd (m, n)= 1
Chiou et al. High‐throughput Dickson basis multiplier with a trinomial for lightweight cryptosystems
Niras et al. Fast sign‐detection algorithm for residue number system moduli set {2n− 1, 2n, 2n+ 1− 1}
Banerjee et al. A New Squarer design with reduced area and delay
Rashidi et al. Efficient implementation of bit‐parallel fault tolerant polynomial basis multiplication and squaring over GF (2m)
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载