Implementation of cryptography algorithm for E-passport security
Citations
6 citations
3 citations
Cites background from "Implementation of cryptography algo..."
...55 4 [18], 1-Kb Virtex-5 - 51 53 5 [19], 1-Kb Virtex-5 54 31 25 6 [20], 32-bits Virtex-5 4 - - 199....
[...]
...The result justifies that our design is power efficient than [18], [19], [20] and [25]....
[...]
3 citations
1 citations
Cites background or methods from "Implementation of cryptography algo..."
...Some of the methods used to perform arithmetic operations include scanning binary bits from left to right [1], Montgomery Algorithm [4],[5],[6], addition and subtraction with nested loops [3], squares and left to right multiplication [7], and Bit-Serial Systolic [8]....
[...]
...include private key generator operations into the research while other studies do not [7]....
[...]
...[7], as shown in Table 1....
[...]
...using Montgomery parallel [7]....
[...]
References
1,569 citations
901 citations
"Implementation of cryptography algo..." refers methods in this paper
...The pseudo code is as shown [3]: Input: A, B, n Output : E = A mod n E <= 1; for i = k-1 to 0 if Bi = 1 E <= A*E mod n; end if if i >0 E <= E*E mod n; end if end for return E;...
[...]
107 citations
"Implementation of cryptography algo..." refers methods in this paper
...Montgomery algorithm [5] using single carry save adder for modular multiplication is preferred....
[...]
22 citations
4 citations