Two-prime RSA immune cryptosystem and its FPGA implementation
Abstract
References
Index Terms
- Two-prime RSA immune cryptosystem and its FPGA implementation
Recommendations
Efficient hardware implementation of RSA cryptography
ASID'09: Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communicationThis paper presents the design and implementation of a RSA crypto accelerator. The purpose is to present an efficient hardware implementation technique of RSA cryptosystem using standard algorithms and HDL based hardware design methodology. The paper ...
Revisiting Prime Power RSA
Recently Sarkar (DCC 2014) has proposed a new attack on small decryption exponent when RSA Modulus is of the form N = p r q for r 2 . This variant is known as Prime Power RSA. The work of Sarkar improves the result of May (PKC 2004) when r 5 . In this ...
Efficient key management FPGA-based cryptosystem using the RNS and iterative coding
The paper reports the development of a new cryptosystem with a multilevel structure for encryption and decryption. At the first level, RNS-based implementation of a public-key RSA signature converts the original plaintext into a ciphertext. Iterated ...
Comments
Information & Contributors
Information
Published In

Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Article
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigda
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 421Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in