{"id":"https://openalex.org/W2171626127","doi":"https://doi.org/10.1109/ccece.2011.6030653","title":"Efficient architectures for modular exponentiation using Montgomery powering ladder","display_name":"Efficient architectures for modular exponentiation using Montgomery powering ladder","publication_year":2011,"publication_date":"2011-05-01","ids":{"openalex":"https://openalex.org/W2171626127","doi":"https://doi.org/10.1109/ccece.2011.6030653","mag":"2171626127"},"language":"en","primary_location":{"id":"doi:10.1109/ccece.2011.6030653","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccece.2011.6030653","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 24th Canadian Conference on Electrical and Computer Engineering(CCECE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055752063","display_name":"Yiruo He","orcid":null},"institutions":[{"id":"https://openalex.org/I74413500","display_name":"University of Windsor","ror":"https://ror.org/01gw3d370","country_code":"CA","type":"education","lineage":["https://openalex.org/I74413500"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Yiruo He","raw_affiliation_strings":["Electrical and Computer Engineering, University of Windsor, Windsor, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, University of Windsor, Windsor, Ontario, Canada","institution_ids":["https://openalex.org/I74413500"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102024025","display_name":"Huapeng Wu","orcid":"https://orcid.org/0000-0002-4584-216X"},"institutions":[{"id":"https://openalex.org/I74413500","display_name":"University of Windsor","ror":"https://ror.org/01gw3d370","country_code":"CA","type":"education","lineage":["https://openalex.org/I74413500"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Huapeng Wu","raw_affiliation_strings":["Electrical and Computer Engineering, University of Windsor, Windsor, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, University of Windsor, Windsor, Ontario, Canada","institution_ids":["https://openalex.org/I74413500"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5055752063"],"corresponding_institution_ids":["https://openalex.org/I74413500"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.18618981,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"001202","last_page":"001205"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/modular-exponentiation","display_name":"Modular exponentiation","score":0.8247948884963989},{"id":"https://openalex.org/keywords/scalar-multiplication","display_name":"Scalar multiplication","score":0.7216652631759644},{"id":"https://openalex.org/keywords/exponentiation","display_name":"Exponentiation","score":0.6968746781349182},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6418883204460144},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5978704690933228},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5791126489639282},{"id":"https://openalex.org/keywords/modular-arithmetic","display_name":"Modular arithmetic","score":0.5404539704322815},{"id":"https://openalex.org/keywords/curve25519","display_name":"Curve25519","score":0.5154236555099487},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5143107175827026},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.4986541271209717},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.48765456676483154},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.4776793122291565},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4695577919483185},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.4684320390224457},{"id":"https://openalex.org/keywords/elliptic-curve","display_name":"Elliptic curve","score":0.42792147397994995},{"id":"https://openalex.org/keywords/multiplication","display_name":"Multiplication (music)","score":0.4144345223903656},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.29609960317611694},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.23906958103179932},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1626657247543335},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08724275231361389},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.06573736667633057}],"concepts":[{"id":"https://openalex.org/C152763109","wikidata":"https://www.wikidata.org/wiki/Q1228841","display_name":"Modular exponentiation","level":4,"score":0.8247948884963989},{"id":"https://openalex.org/C171182647","wikidata":"https://www.wikidata.org/wiki/Q126736","display_name":"Scalar multiplication","level":3,"score":0.7216652631759644},{"id":"https://openalex.org/C81539297","wikidata":"https://www.wikidata.org/wiki/Q33456","display_name":"Exponentiation","level":2,"score":0.6968746781349182},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6418883204460144},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5978704690933228},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5791126489639282},{"id":"https://openalex.org/C32049820","wikidata":"https://www.wikidata.org/wiki/Q319400","display_name":"Modular arithmetic","level":3,"score":0.5404539704322815},{"id":"https://openalex.org/C198690329","wikidata":"https://www.wikidata.org/wiki/Q15702839","display_name":"Curve25519","level":5,"score":0.5154236555099487},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5143107175827026},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.4986541271209717},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.48765456676483154},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.4776793122291565},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4695577919483185},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.4684320390224457},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.42792147397994995},{"id":"https://openalex.org/C2780595030","wikidata":"https://www.wikidata.org/wiki/Q3860309","display_name":"Multiplication (music)","level":2,"score":0.4144345223903656},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.29609960317611694},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.23906958103179932},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1626657247543335},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08724275231361389},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.06573736667633057},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccece.2011.6030653","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccece.2011.6030653","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 24th Canadian Conference on Electrical and Computer Engineering(CCECE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/11","display_name":"Sustainable cities and communities","score":0.7699999809265137}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1500693694","https://openalex.org/W1760641869","https://openalex.org/W2096133993","https://openalex.org/W2099317248","https://openalex.org/W2144952508","https://openalex.org/W2148862943","https://openalex.org/W6674513603","https://openalex.org/W6682220442"],"related_works":["https://openalex.org/W2292159208","https://openalex.org/W2137988767","https://openalex.org/W2076621334","https://openalex.org/W2107014706","https://openalex.org/W2543318645","https://openalex.org/W1977356083","https://openalex.org/W2351661629","https://openalex.org/W2045682094","https://openalex.org/W3023445585","https://openalex.org/W2004447057"],"abstract_inverted_index":{"Side":[0],"channel":[1],"attacks":[2],"have":[3],"been":[4,36],"considered":[5],"as":[6],"serious":[7],"threats":[8],"to":[9,38,106,146,167],"certain":[10],"public-key":[11],"cryptosystems,":[12,31],"such":[13],"like":[14],"RSA":[15,24],"and":[16,25,63,76,89],"elliptic":[17,29],"curve":[18,30],"system.":[19],"For":[20],"modular":[21,55],"exponentiation":[22,56],"for":[23,28,43,54,160],"scalar":[26],"multiplication":[27,88],"Montgomery":[32,59,81,114,157],"powering":[33,60,65,82,115,158],"ladder":[34,61,66,83,109,116,159],"has":[35],"shown":[37],"be":[39],"a":[40,74,131],"good":[41],"choice":[42],"counter-measures":[44],"against":[45],"side-channel":[46],"attacks.":[47],"In":[48],"this":[49],"paper,":[50],"two":[51],"efficient":[52,77,133],"architectures":[53],"respectively":[57],"using":[58,117],"algorithm":[62],"m-ary":[64,156],"method":[67],"are":[68,91],"proposed.":[69],"The":[70,150],"first":[71,148],"one":[72],"is":[73,104,127,135],"straightforward":[75],"implementation":[78],"of":[79,125,142],"the":[80,87,113,123,147,155,161,164],"algorithm,":[84],"in":[85,93],"which":[86],"squaring":[90],"performed":[92],"parallel":[94],"during":[95],"each":[96,108],"clock":[97,143],"cycle.":[98],"A":[99],"novel-designed":[100],"two-by-two":[101],"cross-point":[102],"switch":[103],"used":[105],"select":[107],"step.":[110],"By":[111],"parallelizing":[112],"loop":[118],"unrolling":[119],"technique":[120],"so":[121],"that":[122,137,163],"number":[124,141],"loops":[126],"reduced":[128],"by":[129],"half,":[130],"second":[132,151],"architecture":[134,153],"proposed":[136,152],"requires":[138],"only":[139],"half":[140],"cycles":[144],"compared":[145],"one.":[149],"realizes":[154],"case":[162],"radix":[165],"equals":[166],"4.":[168]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
