Method and device to implement accumulating to arbitrary modulo in cryptographic applications
Abstract
Full Text:
PDFReferences
V. F. Shangin, Zashchita informacii v komp'yuternyh sistemah i setyah [Information protection in computer systems and networks]. DMK Press, 2012. 592 p. (in Russian).
S. Singh, S. K. Maakar, and S. Kumar. “A Performance Analysis of DES and RSA Cryptography.” International Journal of Emerging Trends & Technology in Computer Science, 2013, vol. 2, Issue 3, pp. 418–423.
B. Preneel, “Cryptographic hash functions,” Eur. Trans. Telecommun., vol. 5, no. 4, pp. 431–448, 1994, doi: 10.1002/ETT.4460050406.
G. J. Simmons, “A ‘weak’ privacy protocol using the rsa crypto algorithm,” Cryptologia, vol. 7, no. 2, pp. 180–182, 1983, doi: 10.1080/0161-118391857900.
A. Jung, “Implementing the RSA cryptosystem,” Comput. Secur., vol. 6, no. 4, pp. 342–350, Aug. 1987, doi: 10.1016/0167-4048(87)90070-8.
J. Gordon, “Strong RSA keys,” Electron. Lett., vol. 20, no. 12, pp. 514–516, Jun. 1984, doi: 10.1049/EL:19840357.
M. Preetha and M. Nithya, “A study and performance analysis of RSA algorithm,” IJCSMC, Vol. 2, Issue. 6, June 2013, pg.126 – 139.
Y. V. Artyukhov, Analiz algoritma RSA. Nekotorye rasprostranyonnye elementarnye ataki i mery protivodejstviya im. [Analysis of the RSA algorithm. Some common elementary attacks and countermeasures]. Young Scientist, no. 22, p. Т.1. 85-87, 2010 (in Russian).
H. Nikumbh and V. Shah, “Hardware implementation of modular multiplication,” 2018 3rd IEEE Int. Conf. Recent Trends Electron. Inf. Commun. Technol. RTEICT 2018 - Proc., pp. 376–380, May 2018, doi: 10.1109/RTEICT42901.2018.9012447.
B. V. Tarabrin, S.V. YAkubovski, N. A. Barkanov. B. V. Tarabrin, Spravochnik po integral'nym mikroskhemam. Ed. by B.V. Tarabrin. - 2nd ed., revised and enlarged - M.: Energia, 1981.
V. I. Petrenko, J. V. Kuz’minov. Nakaplivayushchij summator po modulyu [Modulo Adder-Accumulator]. Patent Russia, no. 2500017 C1. 2013 (in Russian).
V. I. Petrenko, D. D. Puiko. Nakaplivayushchij summator po modulyu [Modulo Accumulator]. Patent Russia, no. 2791441 C1. 2023 (in Russian).
R. P. Brent and H. T. Kung, “A Regular Layout for Parallel Adders,” IEEE Trans. Comput., vol. C–31, no. 3, pp. 260–264, 1982, doi: 10.1109/TC.1982.1675982.
T. Matsunaga and Y. Matsunaga, “Timing-constrained area minimization algorithm for parallel prefix adders,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., vol. E90-A, no. 12, pp. 2770–2777, 2007, doi: 10.1093/IETFEC/E90-A.12.2770.
P. Kogge and H. Stone, “A Parallel Algorithm for the Efficient Solution of a General Class of Recurrence Equations,” IEEE Trans. Comput., vol. C–22, no. 8, pp. 786–793, 1973, doi: 10.1109/TC.1973.5009159.
C. H. Pavan Kumar and K. Sivani, “Implementation of efficient parallel prefix adders for residue number system,” Int. J. Comput. Digit. Syst., vol. 4, no. 4, pp. 295–300, Oct. 2015, doi: 10.12785/IJCDS/040409.
S. L. Harris and D. Harris, “Hardware Description Languages,” Digit. Des. Comput. Archit., pp. 170–235, 2022, doi: 10.1016/B978-0-12-820064-3.00004-0.
“Circuit Modeling with Hardware Description Languages,” Top-Down Digit. VLSI Des., pp. 179–300, 2015, doi: 10.1016/B978-0-12-800730-3.00004-6.
P. Benáček, V. Puš, H. Kubátová, and T. Čejka, “P4-To-VHDL: Automatic generation of high-speed input and output network blocks,” Microprocess. Microsyst., vol. 56, pp. 22–33, Feb. 2018, doi: 10.1016/J.MICPRO.2017.10.012.
J. Zhu and N. Dutt, “Electronic System-Level Design and High-Level Synthesis,” Electron. Des. Autom., pp. 235–297, 2009, doi: 10.1016/B978-0-12-374364-0.50012-6.
C. M. Maxfield, “‘Traditional’ Design Flows,” FPGAs: Instant Access, pp. 75–106, 2008, doi: 10.1016/B978-0-7506-8974-8.00005-3.
E.S. Balaka, D.A.Gorodecky, V.S. Rukhlov, A.N. Schelokov, Razrabotka vysokoskorostnyh summatorov po modulyu na baze kombinacionnyh summatorov s parallel'nym perenosom [Design and synthesis of high speed modulo adders using parallel prefix structure] Izvestiya SFedU. Engineering Sciences, no. 6 (179), p. 910, 2016 (in Russian).
Refbacks
- There are currently no refbacks.
Abava Кибербезопасность IT Congress 2024
ISSN: 2307-8162