Skip Navigation Linksdomov > napredno iskanje > rezultati > izpis
Zapis SUTRS

VRSTA GRADIVAanalitična raven (sestavni del), tekstovno gradivo, tiskano, 1.01 - izvirni znanstveni članek
DRŽAVA IZIDASlovenija
LETO IZIDA2006
JEZIK BESEDILA/IZVIRNIKAangleški
PISAVAlatinica
AVTORNedjah, Nadia - avtor
ODGOVORNOSTMacedo Mourelle, Luiza de - avtor
NASLOVǂA ǂreview of modular multiplication methods and respective hardware implementations
V PUBLIKACIJIInformatica. - ISSN 0350-5596. - ǂVol. ǂ30, ǂno. ǂ1 (2006), str. 111-129.
KRATKA VSEBINAGenerally speaking, public-key cryptographic system consist of raising elements of some group such as GF(2n), Z/NZ or elliptic curves, to large powers and reducing the result modulo some given elements. Such operation is often called modular exponentiation and is performed using modular multiplications repeatedly. The practicality of a given cryptographic system depends heavily on how fast modular exponentiations are performed. Consequently, it also depends on how efficiently modular multiplications are done as thee are at base of the computation. This problem has received much attention over the years. Software as well as hardware efficient implementation were proposed. However, the results are scattered through the literature. In this paper wesurvey most known and recent methods for efficient modular multiplication, investigating and examining their strengths and weaknesses. For each methodpresented, we provide and adequate hardware implementation.
OPOMBEBibliografija: str. 128-129
PREDMETNE OZNAKE// kriptografija // komunikacijski sistemi
UDK004.4

izvedba, lastnina in pravice: NUK 2010