Abstract. In SAC 2003, J. Chung and A. Hasan introduced a new class of specific moduli for cryptography, called the more generalized Mersenne numbers, in reference to J. Solinas ’ generalized Mersenne numbers pro-posed in 1999. This paper pursues the quest. The main idea is a new representation, called Modular Number System (MNS), which allows ef-ficient implementation of the modular arithmetic operations required in cryptography. We propose a modular multiplication which only requires n2 multiplications and 3(2n2 − n + 1) additions, where n is the size (in words) of the operands. Our solution is thus more efficient than Mont-gomery for a very large class of numbers that do not belong to the large Mersenne family
We present a new algorithm for residue multiplication modulo the Mersenne prime p = 2(521) - 1 based...
Public-key cryptography is a mechanism for secret communication between parties who have never befor...
. A modular exponentiation is one of the most important operations in public-key cryptography. Howev...
Abstract. In SAC 2003, J. Chung and A. Hasan introduced a new class of specific moduli for cryptogra...
Generalised Mersenne Numbers (GMNs) were defined by Solinas in 1999 and feature in the NIST (FIPS 18...
Abstract — This paper attempts to speed-up the modular reduction as an independent step of modular m...
Modular multiplication is used in a wide range of applications. Most of the existing modular multipl...
With the increased use of public key cryptography, faster modular multiplication has become an impor...
We propose a new number representation and arithmetic for the elements of the ring of integers modul...
Most implementations of the modular exponentiation, ME mod N, computation in cryptographic algorithm...
Several public-key cryptographic systems (Schneier, 1996) make heavy use of modular multiplication. ...
In literature, there are a number of cryptographic algorithms (RSA, ElGamal, NTRU, etc.) that requir...
International audienceThe paper describes a new RNS (residue number system) modular multiplication a...
In 2004, Bajard, Imbert and Plantard introduced a new system of representation to perform arithmetic...
This paper describes carry-less arithmetic operations modulo an integer $2^M - 1$ in the thousand-bi...
We present a new algorithm for residue multiplication modulo the Mersenne prime p = 2(521) - 1 based...
Public-key cryptography is a mechanism for secret communication between parties who have never befor...
. A modular exponentiation is one of the most important operations in public-key cryptography. Howev...
Abstract. In SAC 2003, J. Chung and A. Hasan introduced a new class of specific moduli for cryptogra...
Generalised Mersenne Numbers (GMNs) were defined by Solinas in 1999 and feature in the NIST (FIPS 18...
Abstract — This paper attempts to speed-up the modular reduction as an independent step of modular m...
Modular multiplication is used in a wide range of applications. Most of the existing modular multipl...
With the increased use of public key cryptography, faster modular multiplication has become an impor...
We propose a new number representation and arithmetic for the elements of the ring of integers modul...
Most implementations of the modular exponentiation, ME mod N, computation in cryptographic algorithm...
Several public-key cryptographic systems (Schneier, 1996) make heavy use of modular multiplication. ...
In literature, there are a number of cryptographic algorithms (RSA, ElGamal, NTRU, etc.) that requir...
International audienceThe paper describes a new RNS (residue number system) modular multiplication a...
In 2004, Bajard, Imbert and Plantard introduced a new system of representation to perform arithmetic...
This paper describes carry-less arithmetic operations modulo an integer $2^M - 1$ in the thousand-bi...
We present a new algorithm for residue multiplication modulo the Mersenne prime p = 2(521) - 1 based...
Public-key cryptography is a mechanism for secret communication between parties who have never befor...
. A modular exponentiation is one of the most important operations in public-key cryptography. Howev...