期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
DESIGN AND IMPLEMENTATION OF DUAL-FIELD MODULAR INVERSION ALGORITHM 被引量:1
1
作者 Yang Xiaohui Yang Tongjie Dai Zibin Zhang Yongfu 《Journal of Electronics(China)》 2010年第4期531-537,共7页
Modular inverse arithmetic plays an important role in elliptic curve cryptography. Based on the analysis of Montgomery modular inversion algorithm, this paper presents a new dual-field modular inversion algorithm, and... Modular inverse arithmetic plays an important role in elliptic curve cryptography. Based on the analysis of Montgomery modular inversion algorithm, this paper presents a new dual-field modular inversion algorithm, and a novel scalable and unified architecture for Montgomery inverse hardware in finite fields GF(p) and GF(2n) is proposed. Furthermore, this architecture based on the new modular inversion algorithm has been verified by modeling it in Verilog-HDL, and accomplished it under 0.18 μm CMOS technology. The result indicates that our work has better performance and flexibility than other works. 展开更多
关键词 modular inversion algorithm Dual field Unified architecture
下载PDF
Fast VLSI Implementation of Modular Inversion in Galois Field GF(p)
2
作者 周涛 吴行军 +1 位作者 白国强 陈弘毅 《Tsinghua Science and Technology》 SCIE EI CAS 2003年第5期628-632,共5页
Modular inversion is one of the key arithmetic operations in public key cryptosystems, so low-cost, high-speed hardware implementation is absolutely necessary. This paper presents an algorithm for prime fields for ha... Modular inversion is one of the key arithmetic operations in public key cryptosystems, so low-cost, high-speed hardware implementation is absolutely necessary. This paper presents an algorithm for prime fields for hardware implementation. The algorithm involves only ordinary addition/subtraction and does not need any modular operations, multiplications or divisions. All of the arithmetic operations in the algorithm can be accomplished by only one adder, so it is very suitable for fast very large scale integration (VLSI) implementation. The VLSI implementation of the algorithm is also given with good performance and low silicon penalty. 展开更多
关键词 modular inverse Galois field very large scale integration (VLSI) public key cryptosystem
原文传递
To Construct High Level Secure Communication System: CTMI Is Not Enough
3
作者 Sen Xu Xiangjun Lu +6 位作者 Aidong Chen Haifeng Zhang Haihua Gu Dawu Gu Kaiyu Zhang Zheng Guo Junrong Liu 《China Communications》 SCIE CSCD 2018年第11期122-137,共16页
Public key cryptographic (PKC) algorithms, such as the RSA, elliptic curve digital signature algorithm (ECDSA) etc., are widely used in the secure communication sys- tems, such as OpenSSL, and a variety of in- for... Public key cryptographic (PKC) algorithms, such as the RSA, elliptic curve digital signature algorithm (ECDSA) etc., are widely used in the secure communication sys- tems, such as OpenSSL, and a variety of in- formation security systems. If designer do not securely implement them, the secret key will be easily extracted by side-channel attacks (SCAs) or combinational SCA thus mitigat- ing the security of the entire communication system. Previous countermeasures of PKC im- plementations focused on the core part of the algorithms and ignored the modular inversion which is widely used in various PKC schemes. Many researchers believe that instead of straightforward implementation, constant time modular inversion (CTMI) is enough to resist the attack of simple power analysis combined with lattice analysis. However, we find that the CTMI security can be reduced to a hidden t-bit multiplier problem. Based on this feature, we firstly obtain Hamming weight of interme- diate data through side-channel leakage. Then, we propose a heuristic algorithm to solve the problem by revealing the secret (partial and full) base of CTMI. Comparing previous nec-essary input message for masking filtering, our procedure need not any information about the secret base of the inversion. To our knowl- edge, this is the first time for evaluating the practical security of CTM! and experimental results show the fact that CTMI is not enough for high-level secure communication systems. 展开更多
关键词 information security side channelanalysis elliptic curve digital signature algo-rithm constant time modular inversion ham-ming weight leakage
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部