{"id":"https://openalex.org/W1992420012","doi":"https://doi.org/10.1080/19393550902926053","title":"Efficient Modular Squaring Algorithms for Hardware Implementation in GF(<i>p</i>)","display_name":"Efficient Modular Squaring Algorithms for Hardware Implementation in GF(<i>p</i>)","publication_year":2009,"publication_date":"2009-05-28","ids":{"openalex":"https://openalex.org/W1992420012","doi":"https://doi.org/10.1080/19393550902926053","mag":"1992420012"},"language":"en","primary_location":{"id":"doi:10.1080/19393550902926053","is_oa":false,"landing_page_url":"https://doi.org/10.1080/19393550902926053","pdf_url":null,"source":{"id":"https://openalex.org/S39280739","display_name":"Information Security Journal A Global Perspective","issn_l":"1939-3547","issn":["1939-3547","1939-3555"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Security Journal: A Global Perspective","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018011660","display_name":"Lo\u2019ai Tawalbeh","orcid":"https://orcid.org/0000-0002-2294-9829"},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Lo'ai Tawalbeh","raw_affiliation_strings":["a Computer Engineering Department , Jordan University of Science and Technology , Irbid, Jordan","Computer Engineering Department , Jordan University of Science and Technology , Irbid, Jordan"],"affiliations":[{"raw_affiliation_string":"a Computer Engineering Department , Jordan University of Science and Technology , Irbid, Jordan","institution_ids":["https://openalex.org/I156983542"]},{"raw_affiliation_string":"Computer Engineering Department , Jordan University of Science and Technology , Irbid, Jordan","institution_ids":["https://openalex.org/I156983542"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027331013","display_name":"Saed Swedan","orcid":null},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Saed Swedan","raw_affiliation_strings":["a Computer Engineering Department , Jordan University of Science and Technology , Irbid, Jordan","Computer Engineering Department , Jordan University of Science and Technology , Irbid, Jordan"],"affiliations":[{"raw_affiliation_string":"a Computer Engineering Department , Jordan University of Science and Technology , Irbid, Jordan","institution_ids":["https://openalex.org/I156983542"]},{"raw_affiliation_string":"Computer Engineering Department , Jordan University of Science and Technology , Irbid, Jordan","institution_ids":["https://openalex.org/I156983542"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078148615","display_name":"Adnan Gutub","orcid":"https://orcid.org/0000-0003-0923-202X"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Adnan Gutub","raw_affiliation_strings":["b Computer Engineering Department , King Fahd University of Petroleum and Minerals , Dhahran, Saudi Arabia","Computer Engineering Department , King Fahd University of Petroleum and Minerals , Dhahran, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"b Computer Engineering Department , King Fahd University of Petroleum and Minerals , Dhahran, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]},{"raw_affiliation_string":"Computer Engineering Department , King Fahd University of Petroleum and Minerals , Dhahran, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5018011660"],"corresponding_institution_ids":["https://openalex.org/I156983542"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.12318537,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"18","issue":"3","first_page":"131","last_page":"138"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/modular-exponentiation","display_name":"Modular exponentiation","score":0.7757298946380615},{"id":"https://openalex.org/keywords/operand","display_name":"Operand","score":0.7289599180221558},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.6557931900024414},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.6407291293144226},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6195470094680786},{"id":"https://openalex.org/keywords/gf","display_name":"GF(2)","score":0.559363842010498},{"id":"https://openalex.org/keywords/modular-arithmetic","display_name":"Modular arithmetic","score":0.5519808530807495},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5429877638816833},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.48236721754074097},{"id":"https://openalex.org/keywords/adder","display_name":"Adder","score":0.47246479988098145},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.45851942896842957},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.42484724521636963},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.40048351883888245},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.38811784982681274},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.3814360201358795},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3047385513782501},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.25615471601486206},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2027183473110199},{"id":"https://openalex.org/keywords/finite-field","display_name":"Finite field","score":0.11946189403533936}],"concepts":[{"id":"https://openalex.org/C152763109","wikidata":"https://www.wikidata.org/wiki/Q1228841","display_name":"Modular exponentiation","level":4,"score":0.7757298946380615},{"id":"https://openalex.org/C55526617","wikidata":"https://www.wikidata.org/wiki/Q719375","display_name":"Operand","level":2,"score":0.7289599180221558},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.6557931900024414},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.6407291293144226},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6195470094680786},{"id":"https://openalex.org/C156350748","wikidata":"https://www.wikidata.org/wiki/Q5513324","display_name":"GF(2)","level":3,"score":0.559363842010498},{"id":"https://openalex.org/C32049820","wikidata":"https://www.wikidata.org/wiki/Q319400","display_name":"Modular arithmetic","level":3,"score":0.5519808530807495},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5429877638816833},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.48236721754074097},{"id":"https://openalex.org/C164620267","wikidata":"https://www.wikidata.org/wiki/Q376953","display_name":"Adder","level":3,"score":0.47246479988098145},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.45851942896842957},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.42484724521636963},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.40048351883888245},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.38811784982681274},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3814360201358795},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3047385513782501},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.25615471601486206},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2027183473110199},{"id":"https://openalex.org/C77926391","wikidata":"https://www.wikidata.org/wiki/Q603880","display_name":"Finite field","level":2,"score":0.11946189403533936},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/19393550902926053","is_oa":false,"landing_page_url":"https://doi.org/10.1080/19393550902926053","pdf_url":null,"source":{"id":"https://openalex.org/S39280739","display_name":"Information Security Journal A Global Perspective","issn_l":"1939-3547","issn":["1939-3547","1939-3555"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information Security Journal: A Global Perspective","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322303","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59"},{"id":"https://openalex.org/F4320322323","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W32238348","https://openalex.org/W192123463","https://openalex.org/W1498685334","https://openalex.org/W1527059802","https://openalex.org/W1649758727","https://openalex.org/W1996360405","https://openalex.org/W2004814164","https://openalex.org/W2052435632","https://openalex.org/W2108834246","https://openalex.org/W2156186849","https://openalex.org/W4232836212","https://openalex.org/W4238290165"],"related_works":["https://openalex.org/W2967107136","https://openalex.org/W2072220574","https://openalex.org/W4285082868","https://openalex.org/W2558076308","https://openalex.org/W122256349","https://openalex.org/W1528435681","https://openalex.org/W2145092061","https://openalex.org/W2044062660","https://openalex.org/W1490339722","https://openalex.org/W2608644016"],"abstract_inverted_index":{"ABSTRACT":[0],"Some":[1],"of":[2],"the":[3,54,75,80,95,107],"most":[4],"popular":[5],"public":[6],"key":[7],"encryption":[8],"algorithms":[9,34,64,85],"use":[10],"exponentiation":[11],"as":[12,91,93],"their":[13],"core":[14],"operation,":[15],"which":[16,118],"can":[17],"be":[18],"mostly":[19],"broken":[20],"into":[21],"several":[22],"modular":[23,32,60,97],"squaring":[24,33,47,61,98],"operations.":[25],"In":[26],"this":[27],"paper,":[28],"we":[29],"present":[30,42],"GF(p)":[31],"and":[35,48,122],"efficiently":[36],"implement":[37],"them":[38],"on":[39],"hardware.":[40],"We":[41],"different":[43],"algorithms,":[44],"two":[45],"for":[46,50,110],"one":[49],"reduction":[51],"combined":[52],"with":[53,88,94],"squaring,":[55],"to":[56],"provide":[57],"a":[58],"general":[59],"algorithm.":[62],"The":[63,83,100],"are":[65,86,103],"implemented":[66],"through":[67],"datapaths":[68],"that":[69],"uses":[70],"redundant":[71],"Carry-Save":[72],"Adders,":[73],"making":[74],"computation":[76],"time":[77],"independent":[78],"form":[79],"operands":[81],"precision.":[82],"proposed":[84],"compared":[87],"each":[89],"other":[90],"well":[92],"existing":[96],"algorithms.":[99],"experimental":[101],"results":[102,121],"obtained":[104],"by":[105],"synthesizing":[106],"hardware":[108],"designs":[109],"FPGA":[111],"Virtex5":[112],"chip":[113],"(xc5vlx50":[114],"\u2013":[115],"ff1153":[116],"technology),":[117],"showed":[119],"interesting":[120],"made":[123],"our":[124],"ideas":[125],"very":[126],"attractive.":[127]},"counts_by_year":[{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
