|
Showing 1 - 2 of
2 matches in All Departments
Cryptographic applications, such as RSA algorithm, ElGamal
cryptography, elliptic curve cryptography, Rabin cryptosystem,
Diffie -Hellmann key exchange algorithm, and the Digital Signature
Standard, use modular exponentiation extensively. The performance
of all these applications strongly depends on the efficient
implementation of modular exponentiation and modular
multiplication. Since 1984, when Montgomery first introduced a
method to evaluate modular multiplications, many algorithmic
modifications have been done for improving the efficiency of
modular multiplication, but very less work has been done on the
modular exponentiation to improve the efficiency. This research
monograph addresses the question- how can the performance of
modular exponentiation, which is the crucial operation of many
public-key cryptographic techniques, be improved? The book focuses
on Energy Efficient Modular Exponentiations for Cryptographic
hardware. Spread across five chapters, this well-researched text
focuses in detail on the Bit Forwarding Techniques and the
corresponding hardware realizations. Readers will also discover
advanced performance improvement techniques based on high radix
multiplication and Cryptographic hardware based on multi-core
architectures.
Cryptographic applications, such as RSA algorithm, ElGamal
cryptography, elliptic curve cryptography, Rabin cryptosystem,
Diffie -Hellmann key exchange algorithm, and the Digital Signature
Standard, use modular exponentiation extensively. The performance
of all these applications strongly depends on the efficient
implementation of modular exponentiation and modular
multiplication. Since 1984, when Montgomery first introduced a
method to evaluate modular multiplications, many algorithmic
modifications have been done for improving the efficiency of
modular multiplication, but very less work has been done on the
modular exponentiation to improve the efficiency. This research
monograph addresses the question- how can the performance of
modular exponentiation, which is the crucial operation of many
public-key cryptographic techniques, be improved? The book focuses
on Energy Efficient Modular Exponentiations for Cryptographic
hardware. Spread across five chapters, this well-researched text
focuses in detail on the Bit Forwarding Techniques and the
corresponding hardware realizations. Readers will also discover
advanced performance improvement techniques based on high radix
multiplication and Cryptographic hardware based on multi-core
architectures.
|
You may like...
The Car
Arctic Monkeys
CD
R383
Discovery Miles 3 830
|