-
1
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
Published 2012“…Hardware implementations with target FPGA for GF (p) Montgomery ECC are also presented. The best performance level was achieved when parallelizing Montgomery ECC computations to eight parallel multipliers (PM) using homogeneous coordinates. …”
Get full text
Conference or Workshop Item -
2
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
Published 2013“…Hardware implementations with target FPGA for GF (p) Montgomery ECC are also presented. The best performance level was achieved when parallelizing Montgomery ECC computations to eight parallel multipliers (PM) using homogeneous coordinates. …”
Book Section -
3
A Secure Algorithm for Inversion Modulo 2k
Published 2018-09-01“…Recently, a new algorithm for inversions modulo p k was proposed, which may speed up the calculation of a modulus dependent quantity used in the Montgomery multiplication. The original algorithm lacks security countermeasures; thus, a straightforward implementation may expose the input. …”
Get full text
Article -
4
VLSI implementation of montgomery modular multiplier
Published 2019“…Therefore, the use of software technology to achieve data encryption cannot meet the speed and security requirements of information security. While in the hardware approach of the RSA, the Montgomery modular multiplication is the core component. …”
Get full text
Thesis -
5
Word-Based Processor Structure for Montgomery Modular Multiplier Suitable for Compact IoT Edge Devices
Published 2023-01-01Subjects: Get full text
Article -
6
Asic implementation of low latency montgomery modular exponentiation
Published 2022“…Encryption plays a vital role for every user in ensuring security of communication within the organization. …”
Get full text
Thesis -
7
A Hybrid Approach for Efficient and Secure Point Multiplication on Binary Edwards Curves
Published 2023-05-01Get full text
Article -
8
A Crypto Accelerator of Binary Edward Curves for Securing Low-Resource Embedded Devices
Published 2023-07-01Get full text
Article -
9
Low-Complexity One-Dimensional Parallel Semi-Systolic Structure for Field Montgomery Multiplication Algorithm Perfect for Small IoT Edge Nodes
Published 2022-12-01“…The use of IoT technology in several applications is hampered by security and privacy concerns with IoT edge nodes. …”
Get full text
Article -
10
Low latency high throughput Montgomery modular multiplier for RSA cryptosystem
Published 2022-06-01“…The efficiency of RSA cryptosystem depends on the efficient execution of Montgomery modular multiplication. A low latency and throughput efficient Montgomery modular multiplier is proposed in this paper. …”
Get full text
Article -
11
Land subsidence and aquifer compaction in Montgomery County, Texas, U.S.: 2000–2020
Published 2021-10-01Get full text
Article -
12
-
13
-
14
Montgomery tracheal t-tube stenting as a single first-line treatment in postintubation laryngotracheal stenosis
Published 2018-11-01“…Abstract Objective The aim was to evaluate the use of Montgomery tracheal T-tube stenting as a single first-line treatment for postintubation laryngotracheal stenosis (LTS), addressing the outcomes, its main complications, and how to manage them. …”
Get full text
Article -
15
UpWB: An Uncoupled Architecture Design for White-box Cryptography Using Vectorized Montgomery Multiplication
Published 2024-03-01“…Despite its provable security, space-hard WBC also suffers from heavy performance overhead when executed on general purpose hardware platform, hundreds of magnitude slower than conventional block ciphers. …”
Get full text
Article -
16
An Optimized Hardware Implementation of a Non-Adjacent Form Algorithm Using Radix-4 Multiplier for Binary Edwards Curves
Published 2023-12-01Subjects: Get full text
Article -
17
‘It Was Just the Club from Nowhere:’ The Montgomery Bus Boycott, the Gastro-Politics of Black Domestic Women, and Liberation Theology Futures
Published 2023-06-01“…In Black movements for Black liberation, food and food production are engaged as a communal pedagogy for constructing agency, behavioral reform, economic power, resistance, and sustainable social transformation. While Montgomery preachers made speeches, activists strategized, and male leaders debated the place of women in the Black liberation project, Gilmore and her cadre of Black women domestics secured thousands of dollars to fund the movement by selling soul food staples. …”
Get full text
Article -
18
On the Performance Analysis for CSIDH-Based Cryptosystems
Published 2020-10-01“…In this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. …”
Get full text
Article -
19
-
20
Implementing RSA for Wireless Sensor Nodes
Published 2019-06-01“…In order to achieve these timings, we utilize several acceleration techniques, such as the subtractive Karatsuba-Ofman, Montgomery multiplication, operand scanning, Chinese remainder theorem and sliding window method. …”
Get full text
Article