{"id":"https://openalex.org/W4387870623","doi":"https://doi.org/10.1109/icc45041.2023.10279658","title":"Fast and Parallel Modular Multiplication without Borrow for ECC on ARM-NEON","display_name":"Fast and Parallel Modular Multiplication without Borrow for ECC on ARM-NEON","publication_year":2023,"publication_date":"2023-05-28","ids":{"openalex":"https://openalex.org/W4387870623","doi":"https://doi.org/10.1109/icc45041.2023.10279658"},"language":"en","primary_location":{"id":"doi:10.1109/icc45041.2023.10279658","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icc45041.2023.10279658","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2023 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100368547","display_name":"Wenjie Wang","orcid":"https://orcid.org/0009-0001-1477-0984"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenjie Wang","raw_affiliation_strings":["Institute of Information Egineering, Chinese Academy of Sciences,State Key Laboratory of Information Security,Beijing,China","State Key Laboratory of Information Security, Institute of Information Egineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Egineering, Chinese Academy of Sciences,State Key Laboratory of Information Security,Beijing,China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Egineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101481609","display_name":"Wei Wang","orcid":"https://orcid.org/0009-0009-2713-7000"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["Institute of Information Egineering, Chinese Academy of Sciences,State Key Laboratory of Information Security,Beijing,China","State Key Laboratory of Information Security, Institute of Information Egineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Egineering, Chinese Academy of Sciences,State Key Laboratory of Information Security,Beijing,China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Egineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036002145","display_name":"Jingqiang Lin","orcid":"https://orcid.org/0000-0003-1508-4879"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingqiang Lin","raw_affiliation_strings":["School of Cyber Security, University of Science and Technology of China,Hefei,China","School of Cyber Security, University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Science and Technology of China,Hefei,China","institution_ids":["https://openalex.org/I126520041"]},{"raw_affiliation_string":"School of Cyber Security, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101150141","display_name":"Lina Shang","orcid":null},"institutions":[{"id":"https://openalex.org/I194716290","display_name":"China Academy of Space Technology","ror":"https://ror.org/025397a59","country_code":"CN","type":"government","lineage":["https://openalex.org/I194716290","https://openalex.org/I2802615301"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lina Shang","raw_affiliation_strings":["Space Star Technology Co., Ltd.,Beijing,China","Space Star Technology Co., Ltd., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Space Star Technology Co., Ltd.,Beijing,China","institution_ids":["https://openalex.org/I194716290"]},{"raw_affiliation_string":"Space Star Technology Co., Ltd., Beijing, China","institution_ids":["https://openalex.org/I194716290"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035841418","display_name":"Fan Lang","orcid":"https://orcid.org/0000-0003-0849-8651"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan Lang","raw_affiliation_strings":["Institute of Information Egineering, Chinese Academy of Sciences,State Key Laboratory of Information Security,Beijing,China","State Key Laboratory of Information Security, Institute of Information Egineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Egineering, Chinese Academy of Sciences,State Key Laboratory of Information Security,Beijing,China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Egineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034417654","display_name":"Dingfeng Ye","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dingfeng Ye","raw_affiliation_strings":["Institute of Information Egineering, Chinese Academy of Sciences,State Key Laboratory of Information Security,Beijing,China","State Key Laboratory of Information Security, Institute of Information Egineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Egineering, Chinese Academy of Sciences,State Key Laboratory of Information Security,Beijing,China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Egineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100368547"],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.4546,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.70405986,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"41","issue":null,"first_page":"4552","last_page":"4557"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9793000221252441,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.9198607206344604},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.7490975856781006},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6470351815223694},{"id":"https://openalex.org/keywords/multiplication","display_name":"Multiplication (music)","score":0.6132356524467468},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.598493218421936},{"id":"https://openalex.org/keywords/modular-arithmetic","display_name":"Modular arithmetic","score":0.5654051303863525},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.5538585782051086},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.49492496252059937},{"id":"https://openalex.org/keywords/adder","display_name":"Adder","score":0.42186951637268066},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.40815719962120056},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3377971947193146},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.24301505088806152},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.16564980149269104},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.09174972772598267}],"concepts":[{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.9198607206344604},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.7490975856781006},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6470351815223694},{"id":"https://openalex.org/C2780595030","wikidata":"https://www.wikidata.org/wiki/Q3860309","display_name":"Multiplication (music)","level":2,"score":0.6132356524467468},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.598493218421936},{"id":"https://openalex.org/C32049820","wikidata":"https://www.wikidata.org/wiki/Q319400","display_name":"Modular arithmetic","level":3,"score":0.5654051303863525},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.5538585782051086},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.49492496252059937},{"id":"https://openalex.org/C164620267","wikidata":"https://www.wikidata.org/wiki/Q376953","display_name":"Adder","level":3,"score":0.42186951637268066},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.40815719962120056},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3377971947193146},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.24301505088806152},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.16564980149269104},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.09174972772598267},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc45041.2023.10279658","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icc45041.2023.10279658","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2023 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W304787937","https://openalex.org/W1536508214","https://openalex.org/W1978873566","https://openalex.org/W2203293987","https://openalex.org/W2525730961","https://openalex.org/W2582175223","https://openalex.org/W2766662633","https://openalex.org/W2915352631","https://openalex.org/W2951787038","https://openalex.org/W2966682887","https://openalex.org/W3095605141","https://openalex.org/W3207847759","https://openalex.org/W4206595402","https://openalex.org/W4401979972","https://openalex.org/W6610724843","https://openalex.org/W6687672361","https://openalex.org/W6745801431","https://openalex.org/W6764152780","https://openalex.org/W6764659201"],"related_works":["https://openalex.org/W2158491338","https://openalex.org/W2807901368","https://openalex.org/W2133733652","https://openalex.org/W2072658171","https://openalex.org/W2361290373","https://openalex.org/W4302768783","https://openalex.org/W2782264914","https://openalex.org/W2904069009","https://openalex.org/W2792736654","https://openalex.org/W2355149595"],"abstract_inverted_index":{"Fast":[0],"reduction":[1,6,53,92],"is":[2],"a":[3,87,116],"powerful":[4],"modular":[5,22,118],"method":[7],"for":[8,54],"many":[9],"ECC":[10],"curves":[11,141],"using":[12],"NIST-style":[13,42,126],"prime":[14],"modulus.":[15],"Based":[16,108],"on":[17,51,109,145],"fast":[18,52,91],"reduction,":[19,112],"existing":[20,163],"vectorized":[21,90,117],"multiplication":[23],"schemes":[24,36],"(such":[25],"as":[26,142],"MR":[27],"and":[28,65,85,89,99,138,157,168,170,176],"SMCOS)":[29],"were":[30],"constructed":[31],"in":[32,70],"succession.":[33],"However,":[34],"these":[35],"are":[37],"only":[38],"applicable":[39],"to":[40],"those":[41],"primes":[43],"with":[44,56,94,124,131],"just":[45],"subtraction":[46],"items.":[47,133],"The":[48],"vector":[49,164],"design":[50],"ones":[55,130],"addition":[57,132],"items":[58],"(including":[59],"certain":[60],"well-known":[61],"curves,":[62],"NIST":[63,135,139],"P-256":[64],"SM2,":[66,137],"etc.)":[67],"rarely":[68],"holds":[69],"practice":[71],"because":[72],"of":[73,97,155],"the":[74,95,106,110,129,146,153],"possible":[75],"borrow":[76,104],"situation.":[77],"In":[78],"this":[79,83],"work,":[80],"we":[81,113,151],"fill":[82],"gap":[84],"propose":[86],"pipelined":[88],"that,":[93],"aid":[96],"pre-processing":[98],"post-processing,":[100],"eliminates":[101],"all":[102,125],"potential":[103],"during":[105],"reduction.":[107],"proposed":[111],"successfully":[114],"construct":[115],"multiplication,":[119],"namely":[120],"Borrowless,":[121],"which":[122],"works":[123],"primes,":[127],"including":[128],"Using":[134],"P-256,":[136],"P-224":[140],"case":[143],"studies,":[144],"32-bit":[147],"ARM":[148],"NEON":[149],"platform,":[150],"demonstrate":[152],"effectiveness":[154],"Borrowless":[156],"its":[158],"significant":[159],"performance":[160],"advantage":[161],"over":[162],"designs":[165],"(e.g.,":[166,174],"CICOS":[167],"MR)":[169],"widely-used":[171],"algorithm":[172],"libraries":[173],"OpenSSL":[175],"GMP).":[177]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-06T07:47:59.780226","created_date":"2025-10-10T00:00:00"}
