全能 发表于 2025-3-26 23:39:18

http://reply.papertrans.cn/25/2406/240537/240537_31.png

innovation 发表于 2025-3-27 02:14:56

http://reply.papertrans.cn/25/2406/240537/240537_32.png

并排上下 发表于 2025-3-27 05:28:00

A DES ASIC Suitable for Network Encryption at 10 Gbps and Beyondon of the DES algorithm as defined in the Federal Information Processing Standards (FIPS) Publication 46-2. DES is used for protecting data by cryptographic means. The SNL DES ASIC, over 10 times faster than other currently available DES chips, is a high-speed, fully pipelined implementation offerin

amyloid 发表于 2025-3-27 13:01:48

Hardware Design and Performance Estimation of the 128-bit Block Cipher CRYPTONfficient in hardware implementation. In this paper, hardware designs of CRYPTON, and their performance estimation results are presented. Straightforward hardware designs are improved by exploiting hardware-friendly features of CRYPTON. Hardware architectures are described in VHDL and simulated. Circ

Inelasticity 发表于 2025-3-27 16:45:45

Fast Implementation of Public-Key Cryptography on a DSP TMS320C6201rease speed. For modular multiplication, we devised a new implementation method of Montgomery multiplication, which is suitable for pipeline processing. For elliptic doubling, we devised an improved computation for the number of multiplications and additions. We implemented RSA, DSA and ECDSA on the

Nmda-Receptor 发表于 2025-3-27 20:42:18

How to Implement Cost-Effective and Secure Public Key Cryptosystems the design of crypto-controllers in smart cards becomes more complicated. This paper proposes a secure device in a terminal, “Secure Module”, which can support precomputation technique for Schnorr-type cryptosystems such as Schnorr [.], DSA [.], KCDSA [.]. This gives a simple method to implement se

Nomadic 发表于 2025-3-28 00:20:25

Montgomery’s Multiplication Technique: How to Make It Smaller and Fasteric array implementation stands out most in the history of its success. This article gives a brief history of its implementation in hardware, taking a broad view of the many aspects which need to be considered in chip design. Among these are trade-offs between area and time, higher radix methods, com

AVERT 发表于 2025-3-28 06:01:17

A Scalable Architecture for Montgomery Nultiplicationanipulated by the multiplier, and the selection of the word-size is made according to the available area and/or desired performance. We describe the general view of the new architecture, analyze hardware organization for its parallel computation, and discuss design tradeoffs which are useful to iden

Narcissist 发表于 2025-3-28 07:54:31

Fast Multiplication in Finite Fields GF(2n) convolution product and the squaring operation is a rearrangement of bits. Multiplication in .. has complexity . + 1, which is approximately twice as effecient as optimal normal basis multiplication (ONB) or Montgomery multiplication in GF(2.), while squaring has approximately the same effeciency a

权宜之计 发表于 2025-3-28 11:46:01

Efficient Finite Field Basis Conversion Involving dual baseses are to be carried out in hardware for cryptographic applications. We present algorithms for conversion to and from dual of polynomial and dual of normal bases, as well as algorithms to convert to a polynomial or normal basis which involve the dual of the basis. This builds on work by Kaliski and
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Cryptographic Hardware and Embedded Systems; First International Çetin K. Koç,Christof Paar Conference proceedings 1999 Springer-Verlag Be