Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201

@inproceedings{Itoh1999FastIO,
  title={Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201},
  author={Kouichi Itoh and Masahiko Takenaka and Naoya Torii and Syouji Temma and Yasushi Kurihara},
  booktitle={CHES},
  year={1999}
}
We propose new fast implementation method of public-key cryptography suitable for DSP. We improved modular multiplication and elliptic doubling to increase speed. For modular multiplication, we devised a new implementation method of Montgomery multiplication, which is suitable for pipeline processing. For elliptic doubling, we devised an improved computation for the number of multiplications and additions. We implemented RSA, DSA and ECDSA on the latest DSP (TMS320C6201, Texas Instruments), and… CONTINUE READING
Highly Cited
This paper has 85 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 52 extracted citations

Signal Processing for Cryptography and Security Applications

Handbook of Signal Processing Systems • 2013
View 4 Excerpts
Highly Influenced

Mapping of the AES cryptographic algorithm on a Coarse-Grain reconfigurable array processor

2008 International Conference on Application-Specific Systems, Architectures and Processors • 2008
View 8 Excerpts
Highly Influenced

86 Citations

0510'99'03'08'13'18
Citations per Year
Semantic Scholar estimates that this publication has 86 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 15 references

A Survey of Fast Exponentiation Methods

Daniel M.Gordon
Journal of Algorithms 27, • 1998
View 4 Excerpts
Highly Influenced

A.Vanstone, “HANDBOOK of APPLIED CRYPTOGRAPHY

Alfred J.Menezes, Paul C.van Oorschot, Scott
CRC Press, • 1997
View 2 Excerpts

Efficient Algorithms for Elliptic Curve Cryptosystems ”

C. Paar
1997

Method for Generating and Verifying Electronic Signatures and Privacy Communication Using Elliptic Curves

Atsuko Miyaji
U.S. Patent, • 1995
View 1 Excerpt

Modular Multiplication without Trial Division ”

P. L. Montgomery
Mathematics of Computation • 1995

Method and apparatus for public key exchange in a cryptographic system

Richard E.Crandall
U.S. Patent, • 1992
View 1 Excerpt

S.R.Dusse and B.S.Kaliski Jr., “A Cryptographic Library for the Motorola DSP56000

K. Itoh
Advances in Cryptology-Eurocrypt’90(LNCS 473), • 1991
View 1 Excerpt

A Survey of Hardware Implementations of RSA ”

D. Chudnovsky, G. Chudnovsky
Advances in CryptologyCRYPTO ’ • 1990

Public-Key Encryption Algorithm on a Standard Digital Signal Processor

Paul Barrett, “Implementing the Rivest, Shamir, Adleman
Advances in CryptologyCRYTO’86(LNCS 263), • 1987
View 1 Excerpt

Similar Papers

Loading similar papers…