期刊文献+

一种改进的Montgomery阶梯算法及其实现

A proposed Montgomery ladder algorithm and architectures
下载PDF
导出
摘要 提出了利用Montgomery阶梯算法实现快速模幂运的两种方案。第一种是将每个时钟周期内乘法和平方并行执行,且使用2×2正交变换器选择输出,使Montgomery阶梯算法简单、高效;第二种是使用循环展开技术将循环数减少一半,且只需要一半的时钟,运算效率得到更大的提高。 In this paper, two efficient architectures for modular exponentiation respectively using Montgomery ladder algorithm are proposed. The first one is a straightforward and efficient implementation of the Montgomery ladder algorithm, in which the muhiplieation and squaring are performed in parallel during each clock cycle. A novel designed two-by-two cross-point switch is used to select each ladder step. By parallelizing the Montgomery ladder using loop unrolling technique so that the number of loops is reduced by half, a second efficient architecture is proposed that requires only half number of clock cycles compared to the first one.
机构地区 中国人民解放军
出处 《微型机与应用》 2013年第11期78-80,共3页 Microcomputer & Its Applications
关键词 模幂运算 标量乘 Montgomery阶梯算法 modular exponentiation scalar multiplication Montgomery ladder algorithm
  • 相关文献

参考文献7

  • 1DIFFIE W, HELLMAN M. New directions in cryptography[J]. IEEE tans. Inform. Theory, 1976(22):644-654.
  • 2朱兆国 任忠保 桂祚勤.大数模幂运算的快速算法.高性能计算技术,2006,178(2):45-48.
  • 3MONTGOMERY P L. Modular multiplication without trial division [J]. Mathmatics of Computation, 1985,44 (170) : 519- 521.
  • 4左平,庞世春,华宏图,高顺川,陈守东.安全的并行椭圆曲线Montgomery阶梯算法[J].吉林大学学报(理学版),2011,49(4):690-692. 被引量:4
  • 5GORDON D M. A survey of fast exponentiation methods[J]. Algorithms, 1998,27(1 ) : 129-146.
  • 6MESSERGES T S, DABBISH E A, SLOAN R H. Power analysis attacks of modular exponentiation in Smat'tcards[C]. CHES'99, 1999: 144-157.
  • 7WELJSCHENBACHM.密码编码-加密方法的C与C++实现[M].赵振江,等译.北京:电子工业出版社,2003.

二级参考文献7

  • 1ZHANG Ning, CHEN Zhi-xiong, XIAO Guo-zhen. Efficient Elliptic Curve Scalar Multiplication Algorithms Resistant to Power Analysis [J]. Information Sciences, 2007, 177(10) : 2119-2129.
  • 2SUN Yue-gang, LI Hui-|ai. An Improved Method for Computing Multiplying Points on Koblitz Curve Cryptography [ J ]. Journal of Jilin University: Science Edition, 2009,47(2): 286-288.
  • 3Katsuyuki O, Kouichi M, Kouichi S. A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve [ J]. Information Security and Cryptology, 2002, 228(8) : 3-9.
  • 4Katsuyuki Okeya, Kouichi Sakurai. Efficient Elliptic Curve Cryptosystems from a Scalar Muhiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve [ C ]//CHES2001 Proc of the Third International Workshop on Cryptographic Hardware and Embedded Systems. Berlin: Springer-Verlag, 2001 : 126-141.
  • 5Hanke~on D, Menezes A, Vanstone S. Guide to Elliptic Curve Cryptography [ M ]. Beijing: China Academic Journal Electronic Publishing House, 2005: 29-69.
  • 6PANG Shi-ehun, TONG Shou-yu, CONG Fu-zong, et al. An Efficient Elliptic Curve Scalar Muhiplication Algorithm Against Side Channel Attacks [ C]//Proeeedings of the 2010 International Conference on Computer, Mechatronics, Control and Eleetronic Engineering (CMCE2010). Berlin: Springer-Verlag, 2010: 361-364.
  • 7Domingo-Ferrer J, Posegga J, Schreekling D. Optimal Use of Montgomery Multiplication on Smart Cards [ C ]//Proc CARDIS. Berlin: Springer, 2006: 252-262.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部