{"id":"https://openalex.org/W2130920377","doi":"https://doi.org/10.1109/fpt.2004.1393278","title":"Fast architectures for FPGA-based implementation of RSA encryption algorithm","display_name":"Fast architectures for FPGA-based implementation of RSA encryption algorithm","publication_year":2005,"publication_date":"2005-03-21","ids":{"openalex":"https://openalex.org/W2130920377","doi":"https://doi.org/10.1109/fpt.2004.1393278","mag":"2130920377"},"language":"en","primary_location":{"id":"doi:10.1109/fpt.2004.1393278","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fpt.2004.1393278","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. 2004 IEEE International Conference on Field- Programmable Technology (IEEE Cat. No.04EX921)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030458751","display_name":"Omar Nibouche","orcid":"https://orcid.org/0000-0003-2149-2975"},"institutions":[{"id":"https://openalex.org/I138801177","display_name":"University of Ulster","ror":"https://ror.org/01yp9g959","country_code":"GB","type":"education","lineage":["https://openalex.org/I138801177"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"O. Nibouche","raw_affiliation_strings":["Faculty of Engineering, University of Ulster at Magee, Derry, UK"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, University of Ulster at Magee, Derry, UK","institution_ids":["https://openalex.org/I138801177"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102819800","display_name":"Mokhtar Nibouche","orcid":"https://orcid.org/0000-0003-0150-8087"},"institutions":[{"id":"https://openalex.org/I178535277","display_name":"University of the West of England","ror":"https://ror.org/02nwg5t34","country_code":"GB","type":"education","lineage":["https://openalex.org/I178535277"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"M. Nibouche","raw_affiliation_strings":["Faculty of Computing, University of the West of England, Bristol, UK"],"affiliations":[{"raw_affiliation_string":"Faculty of Computing, University of the West of England, Bristol, UK","institution_ids":["https://openalex.org/I178535277"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033623398","display_name":"Ahmed Bouridane","orcid":"https://orcid.org/0000-0002-1474-2772"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"A. Bouridane","raw_affiliation_strings":["School of computer Science, Queens University of Belfast, Belfast, UK"],"affiliations":[{"raw_affiliation_string":"School of computer Science, Queens University of Belfast, Belfast, UK","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042364148","display_name":"Ammar Belatreche","orcid":"https://orcid.org/0000-0003-1927-9366"},"institutions":[{"id":"https://openalex.org/I138801177","display_name":"University of Ulster","ror":"https://ror.org/01yp9g959","country_code":"GB","type":"education","lineage":["https://openalex.org/I138801177"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"A. Belatreche","raw_affiliation_strings":["Faculty of Engineering, University of Ulster at Magee, Derry, UK"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, University of Ulster at Magee, Derry, UK","institution_ids":["https://openalex.org/I138801177"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5030458751"],"corresponding_institution_ids":["https://openalex.org/I138801177"],"apc_list":null,"apc_paid":null,"fwci":2.4158,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.91745842,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"271","last_page":"278"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8108910322189331},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.7037256360054016},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6465131640434265},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6147246956825256},{"id":"https://openalex.org/keywords/interleaving","display_name":"Interleaving","score":0.5980451107025146},{"id":"https://openalex.org/keywords/multiplier","display_name":"Multiplier (economics)","score":0.5953301191329956},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5935758948326111},{"id":"https://openalex.org/keywords/modular-arithmetic","display_name":"Modular arithmetic","score":0.5434910655021667},{"id":"https://openalex.org/keywords/modular-exponentiation","display_name":"Modular exponentiation","score":0.5331987738609314},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.5267866253852844},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.48125478625297546},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4159051179885864},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.37153559923171997},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.34234732389450073},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.33465081453323364},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.10879084467887878},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07082381844520569}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8108910322189331},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.7037256360054016},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6465131640434265},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6147246956825256},{"id":"https://openalex.org/C28034677","wikidata":"https://www.wikidata.org/wiki/Q17092530","display_name":"Interleaving","level":2,"score":0.5980451107025146},{"id":"https://openalex.org/C124584101","wikidata":"https://www.wikidata.org/wiki/Q1053266","display_name":"Multiplier (economics)","level":2,"score":0.5953301191329956},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5935758948326111},{"id":"https://openalex.org/C32049820","wikidata":"https://www.wikidata.org/wiki/Q319400","display_name":"Modular arithmetic","level":3,"score":0.5434910655021667},{"id":"https://openalex.org/C152763109","wikidata":"https://www.wikidata.org/wiki/Q1228841","display_name":"Modular exponentiation","level":4,"score":0.5331987738609314},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.5267866253852844},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.48125478625297546},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4159051179885864},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.37153559923171997},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.34234732389450073},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33465081453323364},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.10879084467887878},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07082381844520569},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fpt.2004.1393278","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fpt.2004.1393278","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. 2004 IEEE International Conference on Field- Programmable Technology (IEEE Cat. No.04EX921)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.4699999988079071,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1493873707","https://openalex.org/W1745337458","https://openalex.org/W1933689444","https://openalex.org/W1964845253","https://openalex.org/W1971110824","https://openalex.org/W2004814164","https://openalex.org/W2004853280","https://openalex.org/W2033770849","https://openalex.org/W2087656024","https://openalex.org/W2098235952","https://openalex.org/W2111793257","https://openalex.org/W2127856956","https://openalex.org/W2136870067","https://openalex.org/W2142890743","https://openalex.org/W2148225107","https://openalex.org/W2156186849","https://openalex.org/W2156460937","https://openalex.org/W2157482359","https://openalex.org/W2161198480","https://openalex.org/W2161231595","https://openalex.org/W2170940817","https://openalex.org/W4230453618","https://openalex.org/W4232836212","https://openalex.org/W4237773356","https://openalex.org/W4255914823","https://openalex.org/W6681276001","https://openalex.org/W7065831724"],"related_works":["https://openalex.org/W3182915524","https://openalex.org/W2285294304","https://openalex.org/W2364059967","https://openalex.org/W2610264794","https://openalex.org/W2055766186","https://openalex.org/W2039465140","https://openalex.org/W1754395685","https://openalex.org/W2238095429","https://openalex.org/W3046800386","https://openalex.org/W2013253681"],"abstract_inverted_index":{"In":[0],"this":[1],"work,":[2],"new":[3],"structures":[4,13,144,147],"that":[5,110,140],"implement":[6],"RSA":[7,143],"cryptographic":[8],"algorithm":[9],"are":[10,14,30],"presented.":[11],"These":[12],"built":[15,148],"upon":[16],"a":[17],"modified":[18],"Montgomery":[19,42,152],"modular":[20,28],"multiplier,":[21],"where":[22],"the":[23,40,60,65,85,89,94,100,108,128,141,150],"operations":[24,58],"of":[25,47,91,93,106,117,124,134,156],"multiplication":[26],"and":[27,68,88,119],"reductions":[29],"carried":[31],"out":[32],"in":[33,39,76,115,154],"parallel":[34],"rather":[35],"than":[36],"interleaved":[37],"as":[38],"traditional":[41,151],"multiplier.":[43],"The":[44,70,132],"global":[45,161],"broadcast":[46],"data":[48],"lines":[49,162],"is":[50,81],"avoided":[51],"by":[52],"interleaving":[53],"two":[54],"or":[55],"more":[56],"encryption/decryption":[57],"onto":[59],"same":[61],"structure,":[62],"thus":[63],"making":[64],"implementation":[66,135],"systolic":[67],"scalable.":[69],"digit":[71,86],"approach":[72,98],"has":[73],"been":[74],"adopted":[75],"This":[77,79,96],"work.":[78],"methodology":[80],"based":[82],"on":[83],"varying":[84],"size":[87],"level":[90],"pipelining":[92],"structures.":[95],"parameterised":[97],"presents":[99],"designer":[101],"with":[102],"an":[103,122],"efficient":[104],"way":[105],"choosing":[107],"architecture":[109],"suits":[111],"better":[112],"his/her":[113],"requirements":[114],"terms":[116,155],"speed":[118],"area":[120],"usage,":[121],"issue":[123],"critical":[125],"importance":[126],"to":[127,159],"resources-limited":[129],"FPGA":[130,137],"chips.":[131],"results":[133],"using":[136],"have":[138],"shown":[139],"proposed":[142],"outperformed":[145],"those":[146],"around":[149],"multiplier":[153],"speed,":[157],"thanks":[158],"avoiding":[160],"broadcast.":[163]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
