메뉴 건너뛰기




Volumn 10, Issue 2, 2010, Pages 40-56

Finite field arithmetic for cryptography

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION AREA; CRYPTOGRAPHIC ALGORITHMS; CRYPTOGRAPHIC OPERATIONS; CURRENT TRENDS; DESIGN PRACTICE; DESIGN SPACES; ELLIPTIC CURVE; EXECUTION SPEED; FINITE FIELD ARITHMETIC; INTERDISCIPLINARY RESEARCH; PAIRING-BASED CRYPTOGRAPHY; PUBLIC KEYS;

EID: 77952962466     PISSN: 1531636X     EISSN: None     Source Type: Journal    
DOI: 10.1109/MCAS.2010.936785     Document Type: Article
Times cited : (40)

References (57)
  • 1
    • 84937078021 scopus 로고
    • Signed-digit number representations for fast parallel arithmetic
    • Sept
    • A. Avizienis, "Signed-digit number representations for fast parallel arithmetic," IRE Trans. Electron. Comput., vol. EC, no. 10, pp. 389-400, Sept. 1961.
    • (1961) IRE Trans. Electron. Comput. , vol.EC , Issue.10 , pp. 389-400
    • Avizienis, A.1
  • 2
    • 3042641393 scopus 로고    scopus 로고
    • On the importance of eliminating errors in cryptographic computations
    • D. Boneh, R. A. Demillo, and R. J. Lipton, "On the importance of eliminating errors in cryptographic computations," J. Cryptology, vol. 14, pp. 101-119, 2001.
    • (2001) J. Cryptology , vol.14 , pp. 101-119
    • Boneh, D.1    Demillo, R.A.2    Lipton, R.J.3
  • 3
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • LNCS, J. Kilian, Ed. New York: Springer-Verlag
    • D. Boneh and M. K. Franklin, "Identity-based encryption from the Weil pairing," in CRYPTO (LNCS, vol. 2139), J. Kilian, Ed. New York: Springer-Verlag, 2001, pp. 213-229.
    • (2001) CRYPTO , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2
  • 4
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • LNCS, M. K. Franklin, Ed. New York: Springer-Ver-lag
    • D. Boneh, X. Boyen, and H. Shacham, "Short group signatures," in CRYPTO (LNCS, vol. 3152), M. K. Franklin, Ed. New York: Springer-Ver-lag, 2004, pp. 41-55.
    • (2004) CRYPTO , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • M. K. Franklin, in, LNCS, J. Kilian, Ed. New York: Springer-Verlag
    • D. Boneh and M. K. Franklin, "Identity-based encryption from the Weil pairing," in CRYPTO (LNCS, vol. 2139), J. Kilian, Ed. New York: Springer-Verlag, 2001, pp. 213-229.
    • (2001) CRYPTO , vol.2139 , pp. 213-229
    • Boneh, D.1
  • 7
    • 52149103884 scopus 로고    scopus 로고
    • A new direct anonymous attestation scheme from bilinear maps
    • LNCS, P. Lipp, A.-R. Sa-deghi, and K.-M. Koch, Eds. New York: Springer-Verlag, 2008
    • E. Brickell, L. Chen, and J. Li, "A new direct anonymous attestation scheme from bilinear maps," in TRUST (LNCS, vol. 4968), P. Lipp, A.-R. Sa-deghi, and K.-M. Koch, Eds. New York: Springer-Verlag, 2008, pp. 166-178.
    • TRUST , vol.4968 , pp. 166-178
    • Brickell, E.1    Chen, L.2    Li, J.3
  • 9
    • 52149086372 scopus 로고    scopus 로고
    • Pairings in trusted computing
    • LNCS, S. D. Galbraith and K. G. Paterson, Eds. New York: Springer-Verlag
    • L. Chen, P. Morrissey, and N. P. Smart, "Pairings in trusted computing," in Pairing (LNCS, vol. 5209), S. D. Galbraith and K. G. Paterson, Eds. New York: Springer-Verlag, 2008, pp. 1-17.
    • (2008) Pairing , vol.5209 , pp. 1-17
    • Chen, L.1    Morrissey, P.2    Smart, N.P.3
  • 10
    • 24944525692 scopus 로고    scopus 로고
    • Identity based threshold ring signature
    • LNCS, C. Park and S. Chee, Eds. New York: Springer-Verlag
    • S. S. M. Chow, L. C. K. Hui, and S.-M. Yiu, "Identity based threshold ring signature," in ICISC (LNCS, vol. 3506), C. Park and S. Chee, Eds. New York: Springer-Verlag, 2004, pp. 218-232.
    • (2004) ICISC , vol.3506 , pp. 218-232
    • Chow, S.S.M.1    Hui, L.C.K.2    Yiu, S.-M.3
  • 11
    • 84947743704 scopus 로고    scopus 로고
    • Efficient elliptic curve exponentiation using mixed coordinates
    • LNCS, K. Ohta and D. Pei, Eds. New York: Springer-Verlag
    • H. Cohen, A. Miyaji, and T. Ono, "Efficient elliptic curve exponentiation using mixed coordinates," in ASIACRYPT (LNCS, vol. 1514), K. Ohta and D. Pei, Eds. New York: Springer-Verlag, 1998, pp. 51-65.
    • (1998) ASIACRYPT , vol.1514 , pp. 51-65
    • Cohen, H.1    Miyaji, A.2    Ono, T.3
  • 13
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov
    • W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inform. Theory, vol. 22, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Inform. Theory , vol.22 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 14
    • 84954767265 scopus 로고
    • An faster modular multiplication algorithm
    • S. E. Eldridge, "An faster modular multiplication algorithm," Int. J. Comput. Math., vol. 40, no. 1, pp. 63-68, 1991.
    • (1991) Int. J. Comput. Math. , vol.40 , Issue.1 , pp. 63-68
    • Eldridge, S.E.1
  • 15
    • 33747624721 scopus 로고    scopus 로고
    • An RSA implementation resistant to fault attacks and to simple power analysis
    • C. Giraud, "An RSA implementation resistant to fault attacks and to simple power analysis," IEEE Trans. Comput., vol. 55, no. 9, pp. 1116-1120, 2006.
    • (2006) IEEE Trans. Comput. , vol.55 , Issue.9 , pp. 1116-1120
    • Giraud, C.1
  • 16
    • 35248856053 scopus 로고    scopus 로고
    • k)
    • LNCS, B. S. Kaliski, Jr., Ç. K. Koç, and C. Paar, Eds. New York: Springer-Verlag
    • k)," in CHES (LNCS, vol. 2523), B. S. Kaliski, Jr., Ç. K. Koç, and C. Paar, Eds. New York: Springer-Verlag, 2002, pp. 484-499.
    • (2002) CHES , vol.2523 , pp. 484-499
    • Gutub, A.A.-A.1    Tenca, A.F.2    Savaş, E.3    Koç, Ç.K.4
  • 17
    • 68549090587 scopus 로고    scopus 로고
    • Montgomery exponentiation with no final subtractions: Improved results
    • LNCS, Ç. K. Koç and C. Paar, Eds. New York: Springer-Verlag
    • G. Hachez and J.-J. Quisquater, "Montgomery exponentiation with no final subtractions: Improved results," in CHES (LNCS, vol. 1965), Ç. K. Koç and C. Paar, Eds. New York: Springer-Verlag, 2000, pp. 293-301.
    • (2000) CHES , vol.1965 , pp. 293-301
    • Hachez, G.1    Quisquater, J.-J.2
  • 19
    • 84946844750 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • LNCS, W. Bosma, Ed. New York: Springer-Verlag
    • A. Joux, "A one round protocol for tripartite Diffie-Hellman," in ANTS (LNCS, vol. 1838), W. Bosma, Ed. New York: Springer-Verlag, 2000, pp. 385-394.
    • (2000) ANTS , vol.1838 , pp. 385-394
    • Joux, A.1
  • 20
    • 38049090584 scopus 로고    scopus 로고
    • Highly regular right-to-left algorithms for scalar multiplication
    • LNCS, New York: Springer-Verlag
    • M. Joye, "Highly regular right-to-left algorithms for scalar multiplication," in CHES (LNCS, vol. 4727). New York: Springer-Verlag, 2007, pp. 135-147.
    • (2007) CHES , vol.4727 , pp. 135-147
    • Joye, M.1
  • 21
    • 70549091137 scopus 로고    scopus 로고
    • Highly regular m-ary powering ladders
    • LNCS, M. J. J. Jr., V. Rijmen, and R. Safavi-Naini, Eds. New York: Springer-Verlag
    • M. Joye, "Highly regular m-ary powering ladders," in Selected Areas in Cryptography (LNCS, vol. 5867), M. J. J. Jr., V. Rijmen, and R. Safavi-Naini, Eds. New York: Springer-Verlag, 2009, pp. 350-363.
    • (2009) Selected Areas in Cryptography , vol.5867 , pp. 350-363
    • Joye, M.1
  • 22
    • 35248874869 scopus 로고    scopus 로고
    • The Montgomery powering ladder
    • LNCS, B. S. Kaliski, Jr., Ç. K. Koç, and C. Paar, Eds. New York: Springer-Verlag
    • M. Joye and S.-M. Yen, "The Montgomery powering ladder," in CHES (LNCS, vol. 2523), B. S. Kaliski, Jr., Ç. K. Koç, and C. Paar, Eds. New York: Springer-Verlag, 2002, pp. 291-302.
    • (2002) CHES , vol.2523 , pp. 291-302
    • Joye, M.1    Yen, S.-M.2
  • 23
    • 0029358884 scopus 로고
    • The Montgomery inverse and its applications
    • Aug
    • B. S. Kaliski, Jr., "The Montgomery inverse and its applications," IEEE Trans. Comput., vol. 44, no. 8, pp. 1064-1065, Aug. 1995.
    • (1995) IEEE Trans. Comput. , vol.44 , Issue.8 , pp. 1064-1065
    • Kaliski Jr., B.S.1
  • 24
    • 3042690263 scopus 로고    scopus 로고
    • Cryptographic hardware and embedded systems-CHES 2002
    • LNCS, Redwood Shores, CA, Aug. 13-15, New York: Springer-Verlag
    • B. S. Kaliski, Jr., Ç. K. Koç, and C. Paar, Eds., "Cryptographic hardware and embedded systems-CHES 2002," in Proc. 4th Int. Workshop (LNCS, vol. 2523), Redwood Shores, CA, Aug. 13-15, 2002. New York: Springer-Verlag, 2003.
    • (2002) Proc. 4th Int. Workshop , vol.2523
    • Kaliski Jr., B.S.1    Koç, Ç.K.2    Paar, C.E.3
  • 25
    • 75949120375 scopus 로고    scopus 로고
    • Efficient and side-channel-aware implementations of elliptic curve cryptosystems over prime fields
    • D. Karakoyunlu, F. K. Gurkaynak, B. Sunar, and Y. Leblebici, "Efficient and side-channel-aware implementations of elliptic curve cryptosystems over prime fields," IET Inform. Security, vol. 4, no. 1, pp. 30-43, 2010.
    • (2010) IET Inform. Security , vol.4 , Issue.1 , pp. 30-43
    • Karakoyunlu, D.1    Gurkaynak, F.K.2    Sunar, B.3    Leblebici, Y.4
  • 26
    • 0012970453 scopus 로고    scopus 로고
    • J. Kilian, Ed., LNCS, New York: Springer-Verlag
    • J. Kilian, Ed., Advances in Cryptology-CRYPTO 2001 (LNCS, vol. 2139). New York: Springer-Verlag, 2001.
    • (2001) Advances in Cryptology-CRYPTO 2001 , vol.2139
  • 27
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Jan
    • N. Koblitz, "Elliptic curve cryptosystems," Math. Comput., vol. 48, no. 177, pp. 203-209, Jan. 1987.
    • (1987) Math. Comput. , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, N.1
  • 29
    • 0030172012 scopus 로고    scopus 로고
    • Analyzing and comparing Montgomery multiplication algorithms
    • June
    • Ç. K. Koç, T. Acar, and B. S. Kaliski, Jr., "Analyzing and comparing Montgomery multiplication algorithms," IEEE Micro, vol. 16, no. 3, pp. 26-33, June 1996.
    • (1996) IEEE Micro , vol.16 , Issue.3 , pp. 26-33
    • Koç, Ç.K.1    Acar, T.2    Kaliski Jr., B.S.3
  • 30
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • LNCS, N. Koblitz, Ed. New York: Springer-Verlag
    • P. C. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," in CRYPTO (LNCS, vol. 1109), N. Koblitz, Ed. New York: Springer-Verlag, 1996, pp. 104-113.
    • (1996) CRYPTO , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 31
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • LNCS, M. J. Wiener, Ed. New York: Springer-Verlag
    • P. C. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in CRYPTO (LNCS, vol. 1666), M. J. Wiener, Ed. New York: Springer-Verlag, 1999, pp. 388-397.
    • (1999) CRYPTO , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 32
    • 50649116562 scopus 로고    scopus 로고
    • An efficient hardware implementation of the Tate pairing in characteristic three
    • G. Kömürcü and E. Savaş, "An efficient hardware implementation of the Tate pairing in characteristic three," in ICONS. IEEE Computer Society, 2008, pp. 23-28.
    • (2008) ICONS. IEEE Computer Society , pp. 23-28
    • Kömürcü, G.1    Savaş, E.2
  • 34
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • LNCS, H. C. Williams, Ed. New York: Springer-Verlag
    • V. S. Miller, "Use of elliptic curves in cryptography," in CRYPTO (LNCS, vol. 218), H. C. Williams, Ed. New York: Springer-Verlag, 1985, pp. 417-426.
    • (1985) CRYPTO , vol.218 , pp. 417-426
    • Miller, V.S.1
  • 35
    • 84966243285 scopus 로고
    • Modular multiplication without trial division
    • Apr
    • P. L. Montgomery, "Modular multiplication without trial division," Math. Comput., vol. 44, no. 170, pp. 519-521, Apr. 1985.
    • (1985) Math. Comput. , vol.44 , Issue.170 , pp. 519-521
    • Montgomery, P.L.1
  • 36
    • 33645182417 scopus 로고
    • Digital signature standard DSS
    • National Institute for Standards and Technology, Aug
    • National Institute for Standards and Technology, "Digital signature standard (DSS)," Fed. Reg., vol. 56, p. 169, Aug. 1991.
    • (1991) Fed. Reg. , vol.56 , pp. 169
  • 37
    • 0032118834 scopus 로고    scopus 로고
    • Modular multiplication method
    • July
    • J.-H. Oh and S.-J. Moon, "Modular multiplication method," IEE Proc. Comput. Digital Tech., vol. 145, no. 4, pp. 317-318, July 1998.
    • (1998) IEE Proc. Comput. Digital Tech. , vol.145 , Issue.4 , pp. 317-318
    • Oh, J.-H.1    Moon, S.-J.2
  • 39
    • 57849132156 scopus 로고    scopus 로고
    • A versatile Montgomery multiplier architecture with characteristic three support
    • E. Öztürk, B. Sunar, and E. Savaş, "A versatile Montgomery multiplier architecture with characteristic three support," Comput. Electr. Eng., vol. 35, no. 1, pp. 71-85, 2009.
    • (2009) Comput. Electr. Eng. , vol.35 , Issue.1 , pp. 71-85
    • Öztürk, E.1    Sunar, B.2    Savaş, E.3
  • 40
    • 33646775803 scopus 로고    scopus 로고
    • Low-power elliptic curve cryptography using scaled modular arithmetic
    • LNCS, M. Joye and J.-J. Quisquater, Eds. New York: Springer-Verlag
    • E. Öztürk, B. Sunar, and E. Savaş, "Low-power elliptic curve cryptography using scaled modular arithmetic," in CHES (LNCS, vol. 3156), M. Joye and J.-J. Quisquater, Eds. New York: Springer-Verlag, 2004, pp. 92-106.
    • (2004) CHES , vol.3156 , pp. 92-106
    • Öztürk, E.1    Sunar, B.2    Savaş, E.3
  • 41
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 44
    • 0034215495 scopus 로고    scopus 로고
    • The Montgomery modular inverse-revisited
    • July
    • E. Savaş and Ç. K. Koç, "The Montgomery modular inverse-revisited," IEEE Trans. Comput., vol. 49, no. 7, pp. 763-766, July 2000.
    • (2000) IEEE Trans. Comput. , vol.49 , Issue.7 , pp. 763-766
    • Savaş, E.1    Koç, Ç.K.2
  • 45
    • 23644434097 scopus 로고    scopus 로고
    • Efficient unified Montgomery inversion with multibit shifting
    • July
    • E. Savaş, M. Naseer, A. A.-A. Gutub, and Ç. K. Koç, "Efficient unified Montgomery inversion with multibit shifting," IEE Proc. Comput. Digital Tech., vol. 152, no. 4, pp. 489-498, July 2005.
    • (2005) IEE Proc. Comput. Digital Tech. , vol.152 , Issue.4 , pp. 489-498
    • Savaş, E.1    Naseer, M.2    Gutub, A.A.-A.3    Koç, Ç.K.4
  • 48
    • 0001827537 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. CRYPTO, 1984, pp. 47-53.
    • (1984) Proc. CRYPTO , pp. 47-53
    • Shamir, A.1
  • 49
    • 38049086644 scopus 로고    scopus 로고
    • How to maximize the potential of FPGA resources for modular exponentiation
    • LNCS, New York: Spring-er-Verlag
    • D. Suzuki, "How to maximize the potential of FPGA resources for modular exponentiation," in CHES (LNCS, vol. 4727). New York: Spring-er-Verlag, 2007, pp. 272-288.
    • (2007) CHES , vol.4727 , pp. 272-288
    • Suzuki, D.1
  • 51
    • 77956052389 scopus 로고    scopus 로고
    • A scalable architecture for Montgomery multiplication
    • LNCS, Ç. K. Koç and C. Paar, Eds. New York: Springer-Verlag
    • A. F. Tenca and Ç. K. Koç, "A scalable architecture for Montgomery multiplication," in Cryptographic Hardware and Embedded Systems (LNCS, vol. 1717), Ç. K. Koç and C. Paar, Eds. New York: Springer-Verlag, 1999, pp. 94-108.
    • (1999) Cryptographic Hardware and Embedded Systems , vol.1717 , pp. 94-108
    • Tenca, A.F.1    Koç, Ç.K.2
  • 52
    • 4143116646 scopus 로고    scopus 로고
    • An efficient and scalable radix-4 modular multiplier design using recoding techniques
    • Pacific Grove, CA: IEEE Press, Nov. 9-12
    • A. F. Tenca and L. A. Tawalbeh, "An efficient and scalable radix-4 modular multiplier design using recoding techniques," in Proc. 37th Asilomar Conf. Signals, Systems, and Computers. Pacific Grove, CA: IEEE Press, Nov. 9-12, 2003, no. 2, pp. 1445-1450.
    • (2003) Proc. 37th Asilomar Conf. Signals, Systems, and Computers , Issue.2 , pp. 1445-1450
    • Tenca, A.F.1    Tawalbeh, L.A.2
  • 53
    • 84944901460 scopus 로고    scopus 로고
    • High-radix design of a scalable modular multiplier
    • LNCS, Ç. K. Koç, D. Naccache, and C. Paar, Eds. New York: Springer-Verlag
    • A. F. Tenca, G. Todorov, and Ç. K. Koç, "High-radix design of a scalable modular multiplier," in CHES, (LNCS, vol. 2162), Ç. K. Koç, D. Naccache, and C. Paar, Eds. New York: Springer-Verlag, 2001, pp. 185-201.
    • (2001) CHES , vol.2162 , pp. 185-201
    • Tenca, A.F.1    Todorov, G.2    Koç, Ç.K.3
  • 54
    • 0009458561 scopus 로고
    • Faster modular multiplication by operand scaling
    • LNCS, J. Feigenbaum, Ed. New York: Springer-Verlag
    • C. D. Walter, "Faster modular multiplication by operand scaling," in Advances in Cryptology-CRYPTO'91 (LNCS, No. 576), J. Feigenbaum, Ed. New York: Springer-Verlag, 1992, pp. 313-323.
    • (1992) Advances in Cryptology-CRYPTO'91 , Issue.576 , pp. 313-323
    • Walter, C.D.1
  • 55
    • 0033204468 scopus 로고    scopus 로고
    • Montgomery exponentiation needs no final subtractions
    • Oct
    • C. D. Walter, "Montgomery exponentiation needs no final subtractions," Electron. Lett., vol. 35, no. 21, pp. 1831-1832, Oct. 1999.
    • (1999) Electron. Lett. , vol.35 , Issue.21 , pp. 1831-1832
    • Walter, C.D.1
  • 56
    • 77952988324 scopus 로고    scopus 로고
    • Online. Available
    • X ilinx Inc. Trust Zone technology overview [Online]. Available: http://www.xilinx.com/support/documentation/data-sheets/ds312.pdf.
    • Trust Zone Technology Overview
    • Inc, X.1
  • 57
    • 0036505481 scopus 로고    scopus 로고
    • Incomplete reduction in modular arithmetic
    • Mar
    • T. Yanik, E. Savaş, and Ç. K. Koç, "Incomplete reduction in modular arithmetic," IEE Proc. Comput. Digital Tech., vol. 149, no. 2, pp. 46-52, Mar. 2002.
    • (2002) IEE Proc. Comput. Digital Tech. , vol.149 , Issue.2 , pp. 46-52
    • Yanik, T.1    Savaş, E.2    Koç, Ç.K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.