High performance of RSA simulation system based on modified montgomery algorithm
In order to eliminate the effect of the factor R-1 and decrease the number of iteration of modular exponentiation algorithm, a high performance scalable of Right-to-Left scan public-key cipher RSA simulation system is proposed. An advanced high radix Montgomery modular multiplication algorithm is pr...
| Main Authors: | Liu, J., Chen, G., Xiao, Z., Ma, S., Liu, Wan-Quan, Zeng, W. |
|---|---|
| Format: | Conference Paper |
| Published: |
2016
|
| Online Access: | http://hdl.handle.net/20.500.11937/41341 |
Similar Items
Implementation of RSA algorithm
by: Rasid, Hafizul Azizi, et al.
Published: (2011)
by: Rasid, Hafizul Azizi, et al.
Published: (2011)
Modified multi prime RSA cryptosystem
by: Kamardan, M. Ghazali, et al.
Published: (2018)
by: Kamardan, M. Ghazali, et al.
Published: (2018)
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
by: Mohammad Alkhatib,, et al.
Published: (2012)
by: Mohammad Alkhatib,, et al.
Published: (2012)
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
by: Alkhatib, Mohammad, et al.
Published: (2013)
by: Alkhatib, Mohammad, et al.
Published: (2013)
Evaluation of K-SVD embedded with modified l1-norm sparse representation algorithm
by: Wang, M., et al.
Published: (2017)
by: Wang, M., et al.
Published: (2017)
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
by: Shereek, Balkees Mohamed
Published: (2016)
by: Shereek, Balkees Mohamed
Published: (2016)
Comparison of ECC and RSA algorithms in IOT devices
by: Vahdati, Zeinab, et al.
Published: (2019)
by: Vahdati, Zeinab, et al.
Published: (2019)
Psychometric evaluation of the Malay version of the Montgomery-Asberg Depression Rating Scale (MADRS-BM)
by: Yee, Anne, et al.
Published: (2015)
by: Yee, Anne, et al.
Published: (2015)
Performance of image watermarking algorithm using RSA with Fibonacci transform against attacks
by: Mahad, Zahari, et al.
Published: (2023)
by: Mahad, Zahari, et al.
Published: (2023)
Cryptanalysis of RSA
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Kriptosistem Multi-Rsa
by: How Guan Aun, How Guan Aun, et al.
Published: (2001)
by: How Guan Aun, How Guan Aun, et al.
Published: (2001)
Evaluation of K-SVD with different embedded sparse representation algorithms
by: Liu, J., et al.
Published: (2016)
by: Liu, J., et al.
Published: (2016)
Secured electrocardiograph (ECG) signal using partially homomorphic encryption technique–RSA algorithm
by: Shaikh, Muhammad Umair, et al.
Published: (2020)
by: Shaikh, Muhammad Umair, et al.
Published: (2020)
Loop-based RSA Key Generation Algorithm using String Identity
by: Norhidayah, Muhammad, et al.
Published: (2013)
by: Norhidayah, Muhammad, et al.
Published: (2013)
Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2022)
by: Wan Mohd Ruzai, Wan Nur Aqlili, et al.
Published: (2022)
Rivest-Shamir-Adleman (RSA)
by: Mohammed Hayek, Iqram, et al.
Published: (2011)
by: Mohammed Hayek, Iqram, et al.
Published: (2011)
The quartic analog to the RSA cryptosystem
by: Wong, Tze Jin, et al.
Published: (2007)
by: Wong, Tze Jin, et al.
Published: (2007)
New compendium of RSA vulnerabilities
by: Abd Ghafar, Amir Hamzah
Published: (2020)
by: Abd Ghafar, Amir Hamzah
Published: (2020)
Montgomery McFate and Janice H. Laurence (Eds.). 2015. Social Science Goes to War: The Human Terrain System in Iraq and Afghanistan
by: Briggs, Gavin
Published: (2018)
by: Briggs, Gavin
Published: (2018)
DNA sequences compression by GP2R and selective encryption using modified RSA technique
by: Hossein, Syed Mahamud, et al.
Published: (2020)
by: Hossein, Syed Mahamud, et al.
Published: (2020)
On (unknowingly) using near-square RSA primes
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2022)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2022)
Security issues of Novel RSA variant
by: Nitaj, Abderrahmane, et al.
Published: (2022)
by: Nitaj, Abderrahmane, et al.
Published: (2022)
A cubic analogue of the RSA cryptosystem
by: Md Said, Mohamad Rushdan, et al.
Published: (2003)
by: Md Said, Mohamad Rushdan, et al.
Published: (2003)
Pembaikan sistem kriptografi multi RSA
by: Kamardan, Muhammad Ghazali
Published: (2005)
by: Kamardan, Muhammad Ghazali
Published: (2005)
Pembaikan sistem kriptografi multi RSA
by: Kamardan, Muhammad Ghazali
Published: (2005)
by: Kamardan, Muhammad Ghazali
Published: (2005)
On the variants of RSA cryptosystem and its related algebraic cryptanalysis
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2019)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2019)
Enhancement of RSA Key Generation Using Identity
by: Norhidayah, Muhammad, et al.
Published: (2015)
by: Norhidayah, Muhammad, et al.
Published: (2015)
Extending Pollard class of factorable RSA modulus
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2018)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2018)
Fast decryption methods for the Somsuk-RSA cryptosystem.
by: Asbullah, Muhammad Asyraf, et al.
Published: (2024)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2024)
New simultaneous Diophantine attacks on generalized RSA key equations
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
Concurrent factorization of RSA moduli via weak key equations
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
by: Ruzai, Wan Nur Aqlili, et al.
Published: (2024)
RSA with flexible key size: a hardware approach
by: Asaduzzaman, Khandaker, et al.
Published: (2005)
by: Asaduzzaman, Khandaker, et al.
Published: (2005)
A new attack on special-structured RSA primes
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
A RSA-type cryptosystem based on quartic polynomials
by: Wong, Tze Jin
Published: (2011)
by: Wong, Tze Jin
Published: (2011)
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
by: Hani, Mohamed Khalil, et al.
Published: (2000)
by: Hani, Mohamed Khalil, et al.
Published: (2000)
Cryptanalysis of RSA and its variants using continuous midpoint subdivision analysis and lattices
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
by: Wan Mohd Ruzai, Wan Nur Aqlili
Published: (2021)
Strong convergence theorems of a modified ishikawa iterative algorithm with errors for nonexpansive mappings
by: Liu, C., et al.
Published: (2016)
by: Liu, C., et al.
Published: (2016)
Implicit iterative algorithms for continuous Markovian jump Lyapunov equations
by: Wu, A., et al.
Published: (2016)
by: Wu, A., et al.
Published: (2016)
APSCAN: A parameter free algorithm for clustering
by: Chen, Xiaoming, et al.
Published: (2011)
by: Chen, Xiaoming, et al.
Published: (2011)
A novel weighted fuzzy LDA for face recognition using the genetic algorithm
by: Xue, Mingliang, et al.
Published: (2013)
by: Xue, Mingliang, et al.
Published: (2013)
Similar Items
-
Implementation of RSA algorithm
by: Rasid, Hafizul Azizi, et al.
Published: (2011) -
Modified multi prime RSA cryptosystem
by: Kamardan, M. Ghazali, et al.
Published: (2018) -
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
by: Mohammad Alkhatib,, et al.
Published: (2012) -
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
by: Alkhatib, Mohammad, et al.
Published: (2013) -
Evaluation of K-SVD embedded with modified l1-norm sparse representation algorithm
by: Wang, M., et al.
Published: (2017)