177
Views
19
CrossRef citations to date
0
Altmetric
Original Articles

Reconfigurable modular arithmetic logic unit supporting high-performance RSA and ECC over GF( p)

, , , &
Pages 501-514 | Received 15 May 2006, Accepted 14 Nov 2006, Published online: 13 Aug 2007

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (3)

T. N. Shankar, G. Sahoo & S. Niranjan. (2012) Using the Digital Signature of a Fingerprint by an Elliptic Curve Cryptosystem for Enhanced Authentication. Information Security Journal: A Global Perspective 21:5, pages 243-255.
Read now
Chuanpeng Chen & Zhongping Qin. (2011) Efficient algorithm and systolic architecture for modular division. International Journal of Electronics 98:6, pages 813-823.
Read now
Mohammad Hossein Moaiyeri, Reza Faghih Mirzaee, Keivan Navi, Tooraj Nikoubin & Omid Kavehei. (2010) Novel direct designs for 3-input XOR function for low-power and high-speed applications. International Journal of Electronics 97:6, pages 647-662.
Read now

Articles from other publishers (16)

Haibo Yi. (2022) Fast asymmetric encryption and decryption of SimpleMatrix scheme for Internet of Things. Computer Communications 190, pages 145-153.
Crossref
Ajay Kakkar. (2020) A survey on secure communication techniques for 5G wireless heterogeneous networks. Information Fusion 62, pages 89-109.
Crossref
Niels Pirotte, Jo Vliegen, Lejla Batina & Nele Mentens. (2019) Balancing elliptic curve coprocessors from bottom to top. Microprocessors and Microsystems 71, pages 102866.
Crossref
Sailong Fan, Weiqiang Liu, James Howe, Ayesha Khalid & Maire O'Neill. (2018) Lightweight Hardware Implementation of R-LWE Lattice-Based Cryptography. Lightweight Hardware Implementation of R-LWE Lattice-Based Cryptography.
Shahzad Asif, Md Selim Hossain, Yinan Kong & Wadood Abdul. (2018) A Fully RNS based ECC Processor. Integration 61, pages 138-149.
Crossref
Haibo Yi. (2018) Under Quantum Computer Attack: Is Rainbow a Replacement of RSA and Elliptic Curves on Hardware?. Security and Communication Networks 2018, pages 1-9.
Crossref
Haibo Yi & Shaohua Tang. (2016) Very Small FPGA Processor for Multivariate Signatures. The Computer Journal 59:7, pages 1091-1101.
Crossref
Christopher Pöpper, Oliver Mischke & Tim Güneysu. 2014. Reconfigurable Computing: Architectures, Tools, and Applications. Reconfigurable Computing: Architectures, Tools, and Applications 240 247 .
M. Janagan & M. Devanathan. (2012) Area compactness architecture for elliptic curve cryptography. Area compactness architecture for elliptic curve cryptography.
Jianxin Wang & Xingjun Wang. 2012. Intelligent Computing Technology. Intelligent Computing Technology 520 527 .
Michal Varchola, Tim Guneysu & Oliver Mischke. (2011) MicroECC: A Lightweight Reconfigurable Elliptic Curve Crypto-processor. MicroECC: A Lightweight Reconfigurable Elliptic Curve Crypto-processor.
Kimmo Järvinen. (2011) Optimized FPGA-based elliptic curve cryptography processor for high-speed applications. Integration 44:4, pages 270-279.
Crossref
Jo Vliegen, Nele Mentens, Jan Genoe, An Braeken, Serge Kubera, Abdellah Touhafi & Ingrid Verbauwhede. (2010) A compact FPGA-based architecture for elliptic curve cryptography over prime fields. A compact FPGA-based architecture for elliptic curve cryptography over prime fields.
D. Karakoyunlu, F.K. Gurkaynak, B. Sunar & Y. Leblebici. (2010) Efficient and side-channel-aware implementations of elliptic curve cryptosystems over prime fields. IET Information Security 4:1, pages 30.
Crossref
D.M. Schinianakis, A.P. Fournaris, H.E. Michail, A.P. Kakarountas & T. Stouraitis. (2009) An RNS Implementation of an $F_{p}$ Elliptic Curve Point Multiplier. IEEE Transactions on Circuits and Systems I: Regular Papers 56:6, pages 1202-1213.
Crossref
Patrick R. Schaumont, Alex K. Jones & Steve Trimberger. (2009) Guest Editors’ Introduction to Security in Reconfigurable Systems Design. ACM Transactions on Reconfigurable Technology and Systems 2:1, pages 1-6.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.