Cryptographic applications, such as RSA algorithm, ElGamal
cryptography, elliptic curve cryptography, Rabin cryptosystem,
Diffie -Hellmann key exchange algorithm, and the Digital Signature
Standard, use modular exponentiation extensively. The performance
of all these applications strongly depends on the efficient
implementation of modular exponentiation and modular
multiplication. Since 1984, when Montgomery first introduced a
method to evaluate modular multiplications, many algorithmic
modifications have been done for improving the efficiency of
modular multiplication, but very less work has been done on the
modular exponentiation to improve the efficiency. This research
monograph addresses the question- how can the performance of
modular exponentiation, which is the crucial operation of many
public-key cryptographic techniques, be improved? The book focuses
on Energy Efficient Modular Exponentiations for Cryptographic
hardware. Spread across five chapters, this well-researched text
focuses in detail on the Bit Forwarding Techniques and the
corresponding hardware realizations. Readers will also discover
advanced performance improvement techniques based on high radix
multiplication and Cryptographic hardware based on multi-core
architectures.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!