Hardware architectures for public key cryptography

Lejla Batina, Siddika Berna Örs*, Bart Preneel, Joos Vandewalle

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

76 Citations (Scopus)

Abstract

This paper presents an overview of hardware implementations for the two commonly used types of public key cryptography, i.e. RSA and elliptic curve cryptography, both based on modular arithmetic. We first discuss the mathematical background and the algorithms to implement these cryptosystems. Next an overview is given of the different hardware architectures which have been proposed in the literature.

Original languageEnglish
Pages (from-to)1-64
Number of pages64
JournalIntegration
Volume34
Issue number1-2
DOIs
Publication statusPublished - May 2003
Externally publishedYes

Funding

The work was partially supported by Concerted Research Action GOA-MEFISTO-666 of the Flemish Government.

FundersFunder number
Vlaamse regering
Concerted Research ActionGOA-MEFISTO-666

    Keywords

    • Elliptic curve cryptography
    • Hardware architectures
    • Public key cryptography
    • RSA

    Fingerprint

    Dive into the research topics of 'Hardware architectures for public key cryptography'. Together they form a unique fingerprint.

    Cite this