Tripartite modular multiplication

  title={Tripartite modular multiplication},
  author={Kazuo Sakiyama and Miroslav Knezevic and Junfeng Fan and Bart Preneel and Ingrid Verbauwhede},
This paper presents a new modular multiplication algorithm that allows one to implement modular multiplications efficiently. It proposes a systematic approach for maximizing a level of parallelism when performing a modular multiplication. The proposed algorithm effectively integrates three different existing algorithms, a classical modular multiplication based on Barrett reduction, the modular multiplication with Montgomery reduction and the Karatsuba multiplication algorithms in order to… CONTINUE READING
Highly Cited
This paper has 34 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 14 extracted citations

Secure Systolic Montgomery Modular Multiplier Over Prime Fields Resilient to Fault-Injection Attacks

IEEE Transactions on Very Large Scale Integration (VLSI) Systems • 2015
View 3 Excerpts

Performance comparison of multipliers based on Square and Multiply and montgomery algorithms

2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE) • 2014
View 1 Excerpt

Radix-4 implementation of redundant interleaved modular multiplication on FPGA

2014 22nd Iranian Conference on Electrical Engineering (ICEE) • 2014
View 1 Excerpt

Enhanced high speed modular multiplier using karatsuba algorithm

2013 International Conference on Computer Communication and Informatics • 2013
View 1 Excerpt

Parallel Modular Multiplication on Multi-core Processors

2013 IEEE 21st Symposium on Computer Arithmetic • 2013
View 3 Excerpts


Publications referenced by this paper.
Showing 1-10 of 14 references

Elliptic Curve Cryptosystems

View 4 Excerpts
Highly Influenced

Use of Elliptic Curves in Cryptography

CRYPTO • 1985
View 4 Excerpts
Highly Influenced

Montgomery Modular Multiplication Algorithm on Multi-Core Systems

2007 IEEE Workshop on Signal Processing Systems • 2007
View 1 Excerpt

Two Hardware Implementations of the Group Operations Necessary for Implementing an Elliptic Curve Cryptosystem over a Characteristic Two Finite Field

M. J. Potgieter, B. J. van Dyk
In Africon Conference in Africa, • 2002
View 1 Excerpt

Design of an Efficient Public-key Cryptographic Library for RISC-based Smart Cards

J.-F. Dhem
PhD Thesis, • 1998
View 1 Excerpt