A versatile montgomery multiplier architecture with characteristic three support

Warning The system is temporarily closed to updates for reporting purpose.

Öztürk, Erdinç and Sunar, Berk and Savaş, Erkay (2009) A versatile montgomery multiplier architecture with characteristic three support. Computers & Electrical Engineering, 35 (1). pp. 71-85. ISSN 0018-9340

This is the latest version of this item.

PDF (This is a RoMEO green publisher - Author can archive publisher's version/PDF) - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader

Official URL: http://dx.doi.org/10.1016/j.compeleceng.2008.05.009


We present a novel unified core design which is extended to realize Montgomery multiplication in the fields GF(2(n)), GF(3(m)). and GF(p). Our unified design supports RSA and elliptic Curve schemes, as well as the identity-based encryption which requires a pairing computation on an elliptic Curve. The architecture is pipelined and is highly scalable. The unified core utilizes the redundant signed digit representation to reduce the critical path delay. While the carry-save representation used in classical Unified architectures is only good for addition and Multiplication operations, the redundant signed digit representation also facilitates efficient computation of comparison and subtraction operations besides addition and multiplication. Thus, there is no need for a transformation between the redundant and the non-redundant representations of held elements, which Would be required in the classical unified architectures to realize the subtraction and comparison operations. We also quantify the benefits of the unified architectures in terms of area and critical path delay. We provide detailed implementation results. The metric shows that the new unified architecture provides an improvement over a hypothetical non-unified architecture of at least 24.88%, while the improvement over a classical unified architecture is at least 32.07%. (C) 2008 Elsevier Ltd. All rights reserved.

Item Type:Article
Uncontrolled Keywords:Montgomery multiplication; Public key cryptography; Finite fields; Identity-based cryptography
Subjects:T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7800-8360 Electronics > TK7885-7895 Computer engineering. Computer hardware
ID Code:12977
Deposited By:Erkay Savaş
Deposited On:02 Dec 2009 12:28
Last Modified:25 May 2011 14:13

Available Versions of this Item

Repository Staff Only: item control page