Introduction to finite fields and their applications
Introduction to finite fields and their applications
Finite field for scientists and engineers
Finite field for scientists and engineers
A course in number theory and cryptography
A course in number theory and cryptography
Optimal normal bases in GF(pn)
Discrete Applied Mathematics
A cryptographic library for the Motorola DSP56000
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
Elliptic Curve Public Key Cryptosystems
Elliptic Curve Public Key Cryptosystems
A Fast Software Implementation for Arithmetic Operations in GF(2n)
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Fast Key Exchange with Elliptic Curve Systems
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Fast Software Exponentiation in GF(2^k)
ARITH '97 Proceedings of the 13th Symposium on Computer Arithmetic (ARITH '97)
Look-Up Table-Based Large Finite Field Multiplication in Memory Constrained Cryptosystems
IEEE Transactions on Computers - Special issue on computer arithmetic
Parallel Multiplication in GF(2^k) usingPolynomial Residue Arithmetic
Designs, Codes and Cryptography
Montgomery Multiplier and Squarer for a Class of Finite Fields
IEEE Transactions on Computers
High-Speed Software Multiplication in F2m
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Modular Multiplication in GF(pk) Using Lagrange Representation
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Low Complexity Bit-Parallel Finite Field Arithmetic Using Polynomial Basis
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
A Scalable Architecture for Montgomery Multiplication
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Montgomery Multiplier and Squarer in GF(2m)
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Software Implementation of Elliptic Curve Cryptography over Binary Fields
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
A Scalable and Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m)
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m)
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Achieving NTRU with Montgomery Multiplication
IEEE Transactions on Computers
A Scalable Dual-Field Elliptic Curve Cryptographic Processor
IEEE Transactions on Computers
A Scalable Architecture for Modular Multiplication Based on Montgomery's Algorithm
IEEE Transactions on Computers
Fast Normal Basis Multiplication Using General Purpose Processors
IEEE Transactions on Computers
An FPGA implementation of an elliptic curve processor GF(2m)
Proceedings of the 14th ACM Great Lakes symposium on VLSI
IEEE Transactions on Computers
Fast Bit-Parallel GF(2^n) Multiplier for All Trinomials
IEEE Transactions on Computers
A Novel Unified Architecture for Public-Key Cryptography
Proceedings of the conference on Design, Automation and Test in Europe - Volume 3
On-demand design service innovations
IBM Journal of Research and Development
Low-Complexity Bit-Parallel Systolic Montgomery Multipliers for Special Classes of GF(2^m)
IEEE Transactions on Computers
Communication-Computation Trade-off in Executing ECDSA in a Contactless Smartcard
Designs, Codes and Cryptography
Proceedings of the conference on Design, automation and test in Europe: Proceedings
Software Multiplication Using Gaussian Normal Bases
IEEE Transactions on Computers
IEEE Transactions on Computers
Relationship between GF(2^m) Montgomery and Shifted Polynomial Basis Multiplication Algorithms
IEEE Transactions on Computers
Low-complexity bit-parallel systolic multipliers over GF(2m)
Integration, the VLSI Journal
Power aware reconfigurable multiprocessor for elliptic curve cryptography
Proceedings of the conference on Design, automation and test in Europe
A unified architecture for a public key cryptographic coprocessor
Journal of Systems Architecture: the EUROMICRO Journal
Montgomery Residue Representation Fault-Tolerant Computation in GF(2k)
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Modular Reduction in GF(2n) without Pre-computational Phase
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
Digit-Serial Structures for the Shifted Polynomial Basis Multiplication over Binary Extension Fields
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Combined circuit architecture for computing normal basis and montgomery multiplications over GF(2m)
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Scalable and Systolic Montgomery Multipliers over GF(2m)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Efficient inversion algorithm for optimal normal bases type II
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartI
Montgomery multiplication and squaring algorithms in GF(2k)
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartI
An efficient algorithm for computing inverses in GF(2m) using dual bases
ICCS'03 Proceedings of the 2003 international conference on Computational science
Generic GF(2m) arithmetic in software and its application to ECC
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Fast Reconfigurable Elliptic Curve Cryptography Acceleration for GF(2m) on 32 bit Processors
Journal of Signal Processing Systems
Low area - scalable hardware/software co-design for elliptic curve cryptography
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Information Processing Letters
Finite field arithmetic for cryptography
IEEE Circuits and Systems Magazine
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Low complexity digit serial systolic montgomery multipliers for special class of GF(2m)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Design of flexible GF(2m) elliptic curve cryptography processors
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Combined circuit architecture for computing normal basis and Montgomery multiplications over GF(2m)
International Journal of Autonomous and Adaptive Communications Systems
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Efficient multi-bit shifting algorithm in multiplicative inversion problems
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Accelerating inverse of GF(2n) with precomputation
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
A vector approach to cryptography implementation
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Rings of Low Multiplicative Complexity
Finite Fields and Their Applications
GF(2m) finite-field multipliers with reduced activity variations
WAIFI'12 Proceedings of the 4th international conference on Arithmetic of Finite Fields
Efficient gröbner basis reductions for formal verification of galois field multipliers
DATE '12 Proceedings of the Conference on Design, Automation and Test in Europe
FPGA based unified architecture for public key and private key cryptosystems
Frontiers of Computer Science: Selected Publications from Chinese Universities
Hi-index | 0.03 |
We show that the multiplication operation c=a · b ·r^-1 in the field GF(2^k can be implementedsignificantly faster in software than the standard multiplication, where ris a special fixed element of the field. This operation is the finite fieldanalogue of the Montgomery multiplication for modular multiplication ofintegers. We give the bit-level and word-level algorithms for computing theproduct, perform a thorough performance analysis, and compare the algorithmto the standard multiplication algorithm in GF(2^k. TheMontgomery multiplication can be used to obtain fast softwareimplementations of the discrete exponentiation operation, and isparticularly suitable for cryptographic applications where k is large.