IEEE - Institute of Electrical and Electronics Engineers, Inc. - M-ary parallel modular exponentiation: Software vs. hardware

2010 15th CSI International Symposium on Computer Architecture and Digital Systems (CADS)

Author(s): de Souza Raposo, S. ; Santana, M. ; Nedjah, N. ; de Macedo Mourelle, L.
Publisher: IEEE - Institute of Electrical and Electronics Engineers, Inc.
Publication Date: 1 September 2010
Conference Location: Tehran, Iran, Iran
Conference Date: 23 September 2010
Page(s): 19 - 24
ISBN (CD): 978-1-4244-6268-1
ISBN (Electronic): 978-1-4244-6269-8
ISBN (Paper): 978-1-4244-6267-4
DOI: 10.1109/CADS.2010.5623649
Regular:

Most of cryptographic systems are based on modular exponentiation. It is performed using successive modular multiplications. One way of improving the throughput of a cryptographic system... View More

Advertisement