#### Filter Results:

- Full text PDF available (5)

#### Publication Year

2004

2016

- This year (0)
- Last 5 years (5)
- Last 10 years (9)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- Kooroush Manochehri, Saadat Pourmozafari
- Proceedings. The 16th International Conference onâ€¦
- 2004

Montgomery modular multiplication algorithm is commonly used in implementations of the RSA cryptosystem or other cryptosystems based on modular arithmetic. There are several architectures for speedâ€¦ (More)

- Kooroush Manochehri, Saadat Pourmozafari
- International Conference on Informationâ€¦
- 2005

Montgomery modular multiplication algorithm is commonly used in implementations of the RSA cryptosystem or other cryptosystems based on modular arithmetic. There are several improvements for makingâ€¦ (More)

- Mona Dara, Kooroush Manochehri
- Information Security Journal: A Globalâ€¦
- 2014

- Kooroush Manochehri, Saadat Pourmozafari, Babak Sadeghiyan
- Fifth International Conference on Informationâ€¦
- 2008

Basic operations of public key cryptography are multiplication and exponentiation. Because of long operand length, their processing is very time consuming operations. The basic of all of theseâ€¦ (More)

- Kooroush Manochehri, Saadat Pourmozafari, Babak Sadeghiyan
- Computing and Informatics
- 2010

Modular multiplication is a key operation in public key cryptosystems like RSA. Among modular multiplication methods, Montgomery modular multiplication is an efficient algorithm suitable for hardwareâ€¦ (More)

- Kooroush Manochehri, Saadat Pourmozafari, Babak Sadeghiyan
- Third International Conference on Informationâ€¦
- 2006

Modulo 2<sup>n</sup> + 1 and 2<sup>n</sup> - 1 multiplication plays an important role in residue number systems. In this paper two efficient methods for converting the input number to these moduliâ€¦ (More)

- Kooroush Manochehri, Babak Sadeghiyan, Saadat Pourmozafari
- IEICE Electronic Express
- 2010

Montgomery modular multiplication algorithm is commonly used in implementations of the RSA cryptosystem and other cryptosystems with modular operations. Radix-2 version of this algorithm is simpleâ€¦ (More)

This paper propose a new mixture method called Quantum Artificial Bee Colony (QABC) algorithm. QABC is based on some quantum computing concepts, such as qubits and superposition of states. In QABCâ€¦ (More)

Advanced Encryption Standard (AES) block cipher system is widely used in cryptographic applications. Substitution boxes (S-boxes) are keystone of modern symmetric cryptosystems. They bringâ€¦ (More)