Keyword : Montgomery multiplication


Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack
Takeshi SUGAWARA Daisuke SUZUKI Minoru SAEKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/07/01
Vol. E99-A  No. 7 ; pp. 1323-1333
Type of Manuscript:  Special Section PAPER (Special Section on Design Methodologies for System on a Chip)
Category: 
Keyword: 
RSAside-channel attackcollision attackMontgomery multiplication
 Summary | Full Text:PDF(1.7MB)

How to Maximize the Potential of FPGA-Based DSPs for Modular Exponentiation
Daisuke SUZUKI Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 211-222
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
hardware architecturemodular exponentiationMontgomery multiplicationFPGADSP
 Summary | Full Text:PDF(1.1MB)

Unified Dual-Radix Architecture for Scalable Montgomery Multiplications in GF(P) and GF(2n)
Kazuyuki TANIMURA Ryuta NARA Shunitsu KOHARA Youhua SHI Nozomu TOGAWA Masao YANAGISAWA Tatsuo OHTSUKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/09/01
Vol. E92-A  No. 9 ; pp. 2304-2317
Type of Manuscript:  PAPER
Category: VLSI Design Technology and CAD
Keyword: 
elliptic curve cryptographydual-radixmodular multiplicationMontgomery multiplicationscalabilityunified
 Summary | Full Text:PDF(1.6MB)

Faster Double-Size Bipartite Multiplication out of Montgomery Multipliers
Masayuki YOSHINO Katsuyuki OKEYA Camille VUILLAUME 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/08/01
Vol. E92-A  No. 8 ; pp. 1851-1858
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Theory
Keyword: 
Montgomery multiplicationdouble-size techniqueRSAefficient implementationsmartcard
 Summary | Full Text:PDF(347.5KB)

Montgomery Multiplication with Twice the Bit-Length of Multipliers
Masayuki YOSHINO Katsuyuki OKEYA Camille VUILLAUME 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1 ; pp. 203-210
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
Montgomery multiplicationRSAcrypto-coprocessorsmartcard
 Summary | Full Text:PDF(236.2KB)

Concurrent Error Detection in Montgomery Multiplication over GF(2m)
Che-Wun CHIOU Chiou-Yng LEE An-Wen DENG Jim-Min LIN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/02/01
Vol. E89-A  No. 2 ; pp. 566-574
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
cryptographyMontgomery multiplicationfinite field arithmeticfault-tolerant computingconcurrent error detection
 Summary | Full Text:PDF(842.6KB)

A Hardware Algorithm for Modular Multiplication/Division Based on the Extended Euclidean Algorithm
Marcelo E. KAIHARA Naofumi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/12/01
Vol. E88-A  No. 12 ; pp. 3610-3617
Type of Manuscript:  PAPER
Category: VLSI Design Technology and CAD
Keyword: 
modular arithmeticmodular multiplicationmodular divisionMontgomery multiplicationextended Euclidean algorithmhardware algorithm
 Summary | Full Text:PDF(208KB)

An SPA-Based Extension of Schindler's Timing Attack against RSA Using CRT
Yuuki TOMOEDA Hideyuki MIYAKE Atsushi SHIMBO Shinichi KAWAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 147-153
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Tamper-Resistance
Keyword: 
SPAtiming attackMontgomery multiplicationRSAChinese remainder theorem
 Summary | Full Text:PDF(256.4KB)

RNS Montgomery Multiplication Algorithm for Duplicate Processing of Base Transformations
Hanae NOZAKI Atsushi SHIMBO Shinichi KAWAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1 ; pp. 89-97
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Asymmetric Ciphers
Keyword: 
RSA cryptographymodular exponentiationresidue number systemsMontgomery multiplicationbase transformation
 Summary | Full Text:PDF(352.4KB)