Optimized Multiple Word Radix-2 Montgomery Multiplication Algorithm
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 7
Abstract
Montgomery multiplication algorithm is used in the implementation of RSA and other cryptosystems based on modular arithmetic. Several improvements have been suggested to increase its suitability for hardware implementation. Radix-2 Montgomery architectures are easier to implement in hardware. In this paper a modified optimized algorithm for radix-2 Montgomery Multiplication is presented which is based on parallelizing the multiplications within each Processing Element and pre-computation of partial results using assumptions regarding the most significant bit of the previous design thereby improving speed. The design has been modeled using VHDL. The VHDL code has been synthesized and simulated using Xilinx ISE 10.1.
Authors and Affiliations
Harmeet Kaur1 , Charu Madhu
Analyzing the Effects of Different Multimedia Materials on Learning System
Personalized learning has recently become an innovative trend in digital learning. The adaptive material could enhance the intention of learning, and motivate learner to concentrate on learning activity. Informatio...
Fire Threat in Buildings
Fire accident in buildings is a threatening one now a day. The numbers of accidents are increasing in day by day. It creates heavy lives and property losses to the individuals and the nations. To find out the reasons, fr...
An Introduction to Wireless USB Flash Devices
We all know that USB flash devices like pen drives are meant for storing the data. Data reading and writing in USB flash devices is only possible by using USB cables and USB ports of PC. This paper explains an...
A New Approach to Monte Carlo Simulation of Operations
Monte Carlo simulation are a wide class of computational algorithms that use repeated random sampling to arrive at numerical results. In other words, a simulation is run repeatedly in order to obtain the distribution of...
Network Monitoring and Analysis by Packet Sniffing Method
Today we are seeing that computer networks are increasing in their sizes very rapidly. Number of its user increased in past few years and traffic flows in networks also increased, so it’s very important to monitor...