Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor

  • Conference paper
  • First Online:
Public Key Cryptography (PKC 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1560))

Included in the following conference series:

  • 794 Accesses

Abstract

Public-key implementers often face strong hardware-related constraints. In particular, modular operations required in most cryptosystems generally constitute a computational bottleneck in smart-card applications. This paper addresses the size limitation of arithmetic coprocessors and introduces new techniques that virtually increase their computational capacities. We suspect our algorithm to be nearly optimal and challenge the cryptographic community for better results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. P. Montgomery, Modular Multiplication without Trial Division, Mathematics of Computation 44(170), pp 519–521, July 1997.

    Google Scholar 

  2. E. Brickell, A Survey of Hardware Implementations for RSA, Advances in Cryptology, Proceedings of Crypto’89, 1990.

    Google Scholar 

  3. C. Ding, D. Pei and A. Salomaa, Chinese Remainder Theorem-Applications in Computing, Coding, Cryptography, World Scientific Publishing, 1996.

    Google Scholar 

  4. J. C. Bajard, L. S. Didier and P. Kornerup, An RNS Montgomery Modular Multiplication Algorithm, Proceedings of ARITH13, IEEE Computer Society, pp 234–239, July 1997.

    Google Scholar 

  5. H. Handschuh and P. Paillier, CryptoBytes Vol. 4, Num. 1, Sum. 1998

    Google Scholar 

  6. B. Arazi and D. Naccache, Binary to Decimal Conversion Based on the Divisibility of 255 by 5, Electronic Letters, Vol. 28, Num. 23, 1992.

    Google Scholar 

  7. J. F. Dhem, Design of an Efficient Public-Key Cryptographic Librairy for RISC-based Smart Cards, PhD Thesis, UCL, 1998

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Paillier, P. (1999). Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor. In: Public Key Cryptography. PKC 1999. Lecture Notes in Computer Science, vol 1560. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49162-7_18

Download citation

  • DOI: https://doi.org/10.1007/3-540-49162-7_18

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65644-9

  • Online ISBN: 978-3-540-49162-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics