咨询与建议

限定检索结果

文献类型

  • 29 篇 期刊文献
  • 24 篇 会议

馆藏范围

  • 53 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 49 篇 工学
    • 41 篇 计算机科学与技术...
    • 27 篇 电气工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 网络空间安全
    • 5 篇 信息与通信工程
    • 5 篇 软件工程
    • 2 篇 机械工程
    • 2 篇 控制科学与工程
  • 7 篇 理学
    • 7 篇 数学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 53 篇 montgomery algor...
  • 11 篇 modular multipli...
  • 10 篇 cryptography
  • 8 篇 fpga
  • 7 篇 rsa
  • 6 篇 modular exponent...
  • 5 篇 rsa algorithm
  • 5 篇 residue number s...
  • 4 篇 systolic array
  • 4 篇 public key crypt...
  • 3 篇 elliptic curve c...
  • 3 篇 asic
  • 3 篇 digital arithmet...
  • 2 篇 chinese remainde...
  • 2 篇 data security
  • 2 篇 multiplication
  • 2 篇 computer archite...
  • 2 篇 common-multiplic...
  • 2 篇 systolic arrays
  • 2 篇 elliptic curve c...

机构

  • 2 篇 kyungpook natl u...
  • 2 篇 bengal engn & sc...
  • 2 篇 worcester polyte...
  • 2 篇 informat engn un...
  • 2 篇 school of comput...
  • 2 篇 kyungpook natl u...
  • 1 篇 natl def univ ch...
  • 1 篇 anna univ coimba...
  • 1 篇 govt coll techno...
  • 1 篇 psna coll engn &...
  • 1 篇 univ lisbon ines...
  • 1 篇 sun yat sen univ...
  • 1 篇 state key labora...
  • 1 篇 natl cheng kung ...
  • 1 篇 chinese acad sci...
  • 1 篇 mohamed first un...
  • 1 篇 cicese res ctr e...
  • 1 篇 tech univ brauns...
  • 1 篇 air force inst t...
  • 1 篇 natl chiao tung ...

作者

  • 3 篇 lee kj
  • 3 篇 yoo ky
  • 2 篇 wu tao
  • 2 篇 wang wei
  • 2 篇 paludo rogerio
  • 2 篇 huang xinming
  • 2 篇 sousa leonel
  • 2 篇 talapatra somsub...
  • 2 篇 rahaman hafizur
  • 2 篇 wu chia-long
  • 1 篇 shang mingsheng
  • 1 篇 zhang shao-wu
  • 1 篇 min h
  • 1 篇 alkar az
  • 1 篇 lee jen-wei
  • 1 篇 duan cheng-hua
  • 1 篇 mangalam h.
  • 1 篇 rashid muhammad
  • 1 篇 kuchukov viktor ...
  • 1 篇 shanmugalakshmi ...

语言

  • 49 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"主题词=Montgomery algorithm"
53 条 记 录,以下是11-20 订阅
排序:
An Accomplishment of New Level Register File Management Architecture for montgomery algorithm in Elliptic Curve
An Accomplishment of New Level Register File Management Arch...
收藏 引用
1st International Conference on Computer Science, Engineering and Information Technology (CCSEIT 2011)
作者: Prabu, M. Shanmugalakshmi, R. Anna Univ Coimbatore Coimbatore Tamil Nadu India Govt Coll Technol CSE Coimbatore Tamil Nadu India
In this paper, we present a background on Elliptic Curve Cryptography, along with the montgomery operation, which plays major role on Elliptic Curve Cryptosystem and side channel attacks on EC-montgomery operations. W... 详细信息
来源: 评论
Fast Modular Multiplication Execution in Residue Number System
Fast Modular Multiplication Execution in Residue Number Syst...
收藏 引用
IEEE Conference on Quality Management, Transport and Information Security, Information Technologies (IT&MQ&IS)
作者: Chervyakov, Nikolai I. Babenko, Mikhail G. Kuchukov, Viktor A. Deryabin, Maxim A. Kuchukova, Nataliya N. Tchernykh, Andrei N. North Caucasus Fed Univ Math & Math Modelling Stavropol Russia CICESE Res Ctr Ensenada Baja California Mexico
In the paper, we propose a new method of modular multiplication computation, based on Residue Number System. We use an approximate method to find the approximate method a residue from division of a multiplication on t... 详细信息
来源: 评论
A Novel and Efficient Design for an RSA Cryptosystem With a Very Large Key Size
收藏 引用
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS 2015年 第10期62卷 972-976页
作者: Huang, Xinming Wang, Wei Worcester Polytech Inst Dept Elect & Comp Engn Worcester MA 01609 USA
This brief presents a novel and efficient design for a Rivest-Shamir-Adleman (RSA) cryptosystem with a very large key size. A new modular multiplier architecture is proposed by combining the fast Fourier transform-bas... 详细信息
来源: 评论
FPGA Implementation of Modified Serial montgomery Modular Multiplication for 2048-bit RSA Cryptosystems  16
FPGA Implementation of Modified Serial Montgomery Modular Mu...
收藏 引用
International Seminar on Intelligent Technology and Its Applications (ISITIA)
作者: Hanindhito, Bagus Ahmadi, Nur Hogantara, Hafez Arrahmah, Annisa I. Adiono, Trio Bandung Inst Technol Dept Elect Engn Sch Elect Engn & Informat Jl Ganesha 10 Bandung 40132 Indonesia
RSA (Rivest, Shamir, Adleman) is one of the most widely used cryptographic algorithms worldwide to perform data encryption and decryption. An essential step in RSA computation lies on its modular multiplication which ... 详细信息
来源: 评论
Research and Implementation of Four-prime RSA Digital Signature algorithm  14
Research and Implementation of Four-prime RSA Digital Signat...
收藏 引用
14th IEEE/ACIS International Conference on Computer and Information Science (ICIS)
作者: Xiao, Zhenjiu Wang, Yongbin Jiang, Zhengtao Commun Univ China Sch Comp Sci Beijing Peoples R China Liaoning Tech Univ Coll Software Huludao Peoples R China
Big module RSA signature algorithm is very popular these years. We try to improve it and get more operation efficiency. We proposed a four-prime Chinese Remainder Theorem (CRT)-RSA digital signature algorithm in this ... 详细信息
来源: 评论
Implementation of Cryptography algorithm for E-Passport Security
Implementation of Cryptography Algorithm for E-Passport Secu...
收藏 引用
IEEE International Conference on Inventive Computation Technologies (ICICT)
作者: Sharma, Shruti Zodpe, Harshali Maharashtra Inst Technol Dept Elect & Commun Pune Maharashtra India
Information Security is a major issue worldwide. Various steps are being taken to improve and upgrade security measures. Border crossings across countries have become one of them. Therefore the use of traditional pass... 详细信息
来源: 评论
Performance comparison of Multipliers based on Square and Multiply and montgomery algorithms
Performance comparison of Multipliers based on Square and Mu...
收藏 引用
International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE)
作者: Gokul, P. R. Prabhu, E. Mangalam, H. Amrita Vishwa Vidyapeetham Elect & Commun Dept Coimbatore Tamil Nadu India Sri Krishna Coll Engn & Technol Elect & Commun Dept Coimbatore Tamil Nadu India
Modular multiplication is the core arithmetic for most of the Cryptographic applications. montgomery multiplication is one of the fastest methods available for performing modular multiplication. A k - partition method... 详细信息
来源: 评论
Modular Arithmetic Analyses for RSA Cryptosystem
Modular Arithmetic Analyses for RSA Cryptosystem
收藏 引用
International Symposium on Computer, Consumer and Control (IS3C)
作者: Wu, Chia-Long Hu, Chen-Hao Air Force Inst Technol Aviat Commun Elect Dept Kaohsiung Taiwan
In many consumer electronics computation problem, the modular exponentiation is a common operation for scrambling secret data and is used by several public-key cryptosystems, such as the RSA method. In this paper, an ... 详细信息
来源: 评论
Improved RNS montgomery Modular Multiplication with Residue Recovery
Improved RNS Montgomery Modular Multiplication with Residue ...
收藏 引用
International Conference on Soft Computing Techniques and Engineering Application (ICSCTEA)
作者: Wu, Tao Li, Shuguo Liu, Litian Tsinghua Univ Dept Microelect & Nanoelect Beijing 100084 Peoples R China Tsinghua Univ Inst Microelect Beijing 100084 Peoples R China
Finite field arithmetic in residue number system (RNS) necessitates modular reductions, which can be carried out with RNS montgomery algorithm. By transforming long-precision modular multiplications into modular multi... 详细信息
来源: 评论
A Novel Fast Modular Multiplier Architecture for 8,192-bit RSA Cryposystem
A Novel Fast Modular Multiplier Architecture for 8,192-bit R...
收藏 引用
IEEE Conference on High Performance Extreme Computing (HPEC)
作者: Wang, Wei Huang, Xinming Worcester Polytech Inst Dept Elect & Comp Engn Worcester MA 01609 USA
Modular multiplication is the most crucial component in RSA cryptosystem. In this paper, we present a new modular multiplication architecture using the Strassen multiplication algorithm and montgomery reduction. The a... 详细信息
来源: 评论