Efficient hardware implementation of finite fields with applications to cryptography

被引:25
|
作者
Guajardo, Jorge [1 ]
Gueneysu, Tim
Kumar, Sandeep S.
Paar, Christof
Pelzl, Jan
机构
[1] Philips Res, Informat & Syst Secur Dept, Eindhoven, Netherlands
[2] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, D-4630 Bochum, Germany
关键词
field arithmetic; cryptography; efficient implementation; binary field arithmetic; prime field arithmetic; extension field arithmetic; Optimal extension fields;
D O I
10.1007/s10440-006-9072-z
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The paper presents a survey of most common hardware architectures for finite field arithmetic especially suitable for cryptographic applications. We discuss architectures for three types of finite fields and their special versions popularly used in cryptography: binary fields, prime fields and extension fields. We summarize algorithms and hardware architectures for finite field multiplication, squaring, addition/subtraction, and inversion for each of these fields. Since implementations in hardware can either focus on high-speed or on area-time efficiency, a careful choice of the appropriate set of architectures has to be made depending on the performance requirements and available area.
引用
收藏
页码:75 / 118
页数:44
相关论文
共 50 条
  • [1] Efficient Hardware Implementation of Finite Fields with Applications to Cryptography
    Jorge Guajardo
    Tim Güneysu
    Sandeep S. Kumar
    Christof Paar
    Jan Pelzl
    [J]. Acta Applicandae Mathematica, 2006, 93 : 75 - 118
  • [2] Efficient software-implementation of finite fields with applications to cryptography
    Guajardo, Jorge
    Kumar, Sandeep S.
    Paar, Christof
    Pelzl, Jan
    [J]. ACTA APPLICANDAE MATHEMATICAE, 2006, 93 (1-3) : 3 - 32
  • [3] Efficient Software-Implementation of Finite Fields with Applications to Cryptography
    Jorge Guajardo
    Sandeep S. Kumar
    Christof Paar
    Jan Pelzl
    [J]. Acta Applicandae Mathematica, 2006, 93 : 3 - 32
  • [4] Efficient Hardware Implementation of RSA Cryptography
    Rahman, Mostafizur
    Rokon, Iqbalur Rahman
    Rahman, Miftahur
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 316 - 319
  • [5] Hardware implementation of finite fields of characteristic three
    Page, D
    Smart, NP
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002, 2002, 2523 : 529 - 539
  • [6] An efficient hardware implementation for AI applications
    Dimopouos, Alexandros
    Pavlatos, Christos
    Panagopoulos, Ioannis
    Papakonstantinou, George
    [J]. ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2006, 3955 : 35 - 45
  • [7] On Applications of Singular Matrices over Finite Fields in Cryptography
    Yadav, Dhirendra Singh
    Sharma, Rajendra K.
    Shukla, Wagish
    [J]. SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 181 - 185
  • [8] Efficient hardware implementation of elliptic curve cryptography over GF(pm)
    Lee, MK
    Kim, KT
    Kim, H
    Kim, DK
    [J]. INFORMATION SECURITY APPLICATIONS, 2006, 3786 : 207 - 217
  • [9] Hardware Implementation and Study of Inverse Algorithm in Finite Fields
    Bao Kejin
    Song Yonggang
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (9A): : 38 - 44
  • [10] A note on complete polynomials over finite fields and their applications in cryptography
    Muratovic-Ribic, Amela
    Pasalic, Enes
    [J]. FINITE FIELDS AND THEIR APPLICATIONS, 2014, 25 : 306 - 315