Proceedings on Advances in cryptology---CRYPTO '86
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Smart Card Crypto-Coprocessors for Public-Key Cryptography
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
Recent Results on Modular Multiplications for Smart Cards
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
CORSAIR: A SMART Card for Public Key Cryptosystems
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
The RSA cryptography processor
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Factorization of a 512-bit RSA modulus
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Applications of fast truncated multiplication in cryptography
EURASIP Journal on Embedded Systems
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Montgomery Multiplication with Twice the Bit-Length of Multipliers
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Unbridle the bit-length of a crypto-coprocessor with montgomery multiplication
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Double-size bipartite modular multiplication
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Fast truncated multiplication for cryptographic applications
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Using an RSA accelerator for modular inversion
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Hi-index | 0.01 |
We present a novel technique which allows a virtual increase of the bitlength of a crypto-coprocessor in an efficient and elegant way. The proposed algorithms assume that the coprocessor is equipped with a special modular multiplication instruction. This instruction, called MultModDiv(A,B,N) computes A * B mod N and 驴(A*B)/N驴. In addition to the doubling algorithm, we also present two conceivable economic implementations of the MultModDiv instruction: one hardware and one software realization. The hardware realization of the MultModDiv instruction has the same performance as the modular multiplication presented in the paper. The software realization requires two calls of the modular multiplication instruction. Our most efficient algorithm needs only six calls to an n-bit MultModDiv instruction to compute a modular 2n-bit multiplication. Obviously, special variants of our algorithm, e.g., squaring, require fewer calls.