{"id":"https://openalex.org/W2048348735","doi":"https://doi.org/10.1109/tcad.2015.2424928","title":"High-Performance Two-Dimensional Finite Field Multiplication and Exponentiation for Cryptographic Applications","display_name":"High-Performance Two-Dimensional Finite Field Multiplication and Exponentiation for Cryptographic Applications","publication_year":2015,"publication_date":"2015-04-21","ids":{"openalex":"https://openalex.org/W2048348735","doi":"https://doi.org/10.1109/tcad.2015.2424928","mag":"2048348735"},"language":"en","primary_location":{"id":"doi:10.1109/tcad.2015.2424928","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcad.2015.2424928","pdf_url":null,"source":{"id":"https://openalex.org/S100835903","display_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","issn_l":"0278-0070","issn":["0278-0070","1937-4151"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064156050","display_name":"Reza Azarderakhsh","orcid":"https://orcid.org/0000-0002-6921-6868"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Reza Azarderakhsh","raw_affiliation_strings":["Department of Computer Engineering, Rochester Institute of Technology, Rochester, NY, USA","[Dept. of Comput. Eng., Rochester Inst. of Technol., Rochester, NY, USA]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Rochester Institute of Technology, Rochester, NY, USA","institution_ids":["https://openalex.org/I155173764"]},{"raw_affiliation_string":"[Dept. of Comput. Eng., Rochester Inst. of Technol., Rochester, NY, USA]","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025872285","display_name":"Mehran Mozaffari Kermani","orcid":"https://orcid.org/0000-0003-4513-3109"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mehran Mozaffari-Kermani","raw_affiliation_strings":["Department of Electrical and Microelectronic Engineering, Rochester Institute of Technology, Rochester, NY, USA","Department of Electrical and Microelectronic Engineering, Rochester Institute of Technology, Rochester, NY, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Microelectronic Engineering, Rochester Institute of Technology, Rochester, NY, USA","institution_ids":["https://openalex.org/I155173764"]},{"raw_affiliation_string":"Department of Electrical and Microelectronic Engineering, Rochester Institute of Technology, Rochester, NY, USA#TAB#","institution_ids":["https://openalex.org/I155173764"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5064156050"],"corresponding_institution_ids":["https://openalex.org/I155173764"],"apc_list":null,"apc_paid":null,"fwci":3.973,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.94004693,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"34","issue":"10","first_page":"1569","last_page":"1576"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exponentiation","display_name":"Exponentiation","score":0.9178858995437622},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6970908045768738},{"id":"https://openalex.org/keywords/modular-exponentiation","display_name":"Modular exponentiation","score":0.673794150352478},{"id":"https://openalex.org/keywords/multiplication","display_name":"Multiplication (music)","score":0.6569228768348694},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6306302547454834},{"id":"https://openalex.org/keywords/finite-field","display_name":"Finite field","score":0.6198596358299255},{"id":"https://openalex.org/keywords/finite-field-arithmetic","display_name":"Finite field arithmetic","score":0.5263549089431763},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.4970581829547882},{"id":"https://openalex.org/keywords/normal-basis","display_name":"Normal basis","score":0.46221891045570374},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.4362075626850128},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3739316463470459},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3129592537879944},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.28897416591644287},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.28461021184921265},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.28427767753601074},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.1678728461265564},{"id":"https://openalex.org/keywords/galois-theory","display_name":"Galois theory","score":0.09643429517745972}],"concepts":[{"id":"https://openalex.org/C81539297","wikidata":"https://www.wikidata.org/wiki/Q33456","display_name":"Exponentiation","level":2,"score":0.9178858995437622},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6970908045768738},{"id":"https://openalex.org/C152763109","wikidata":"https://www.wikidata.org/wiki/Q1228841","display_name":"Modular exponentiation","level":4,"score":0.673794150352478},{"id":"https://openalex.org/C2780595030","wikidata":"https://www.wikidata.org/wiki/Q3860309","display_name":"Multiplication (music)","level":2,"score":0.6569228768348694},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6306302547454834},{"id":"https://openalex.org/C77926391","wikidata":"https://www.wikidata.org/wiki/Q603880","display_name":"Finite field","level":2,"score":0.6198596358299255},{"id":"https://openalex.org/C189178079","wikidata":"https://www.wikidata.org/wiki/Q5450398","display_name":"Finite field arithmetic","level":3,"score":0.5263549089431763},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.4970581829547882},{"id":"https://openalex.org/C205567592","wikidata":"https://www.wikidata.org/wiki/Q3527199","display_name":"Normal basis","level":3,"score":0.46221891045570374},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.4362075626850128},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3739316463470459},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3129592537879944},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.28897416591644287},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.28461021184921265},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.28427767753601074},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.1678728461265564},{"id":"https://openalex.org/C94398972","wikidata":"https://www.wikidata.org/wiki/Q92552","display_name":"Galois theory","level":2,"score":0.09643429517745972},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tcad.2015.2424928","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcad.2015.2424928","pdf_url":null,"source":{"id":"https://openalex.org/S100835903","display_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","issn_l":"0278-0070","issn":["0278-0070","1937-4151"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","raw_type":"journal-article"},{"id":"pmh:oai:scholarcommons.usf.edu:esb_facpub-1021","is_oa":false,"landing_page_url":"https://scholarcommons.usf.edu/esb_facpub/23","pdf_url":null,"source":{"id":"https://openalex.org/S4377196272","display_name":"Digital Commons - University of South Florida (University of South Florida)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2613432","host_organization_name":"University of South Florida","host_organization_lineage":["https://openalex.org/I2613432"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computer Science and Engineering Faculty Publications","raw_type":"text"},{"id":"pmh:oai:digitalcommons.usf.edu:esb_facpub-1021","is_oa":false,"landing_page_url":"https://digitalcommons.usf.edu/esb_facpub/23","pdf_url":null,"source":{"id":"https://openalex.org/S4377196272","display_name":"Digital Commons - University of South Florida (University of South Florida)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2613432","host_organization_name":"University of South Florida","host_organization_lineage":["https://openalex.org/I2613432"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computer Science and Engineering Faculty Publications","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1515926918","https://openalex.org/W1576903769","https://openalex.org/W1764137175","https://openalex.org/W1884701998","https://openalex.org/W1963863611","https://openalex.org/W1968718173","https://openalex.org/W1970404001","https://openalex.org/W1974288188","https://openalex.org/W1977391363","https://openalex.org/W1981856935","https://openalex.org/W1988545107","https://openalex.org/W1992130569","https://openalex.org/W1999804313","https://openalex.org/W2027457414","https://openalex.org/W2031993065","https://openalex.org/W2068419503","https://openalex.org/W2085540322","https://openalex.org/W2095708839","https://openalex.org/W2108834246","https://openalex.org/W2115179918","https://openalex.org/W2136921119","https://openalex.org/W2148575324","https://openalex.org/W2152511894","https://openalex.org/W2156186849","https://openalex.org/W2161080473","https://openalex.org/W4213415225","https://openalex.org/W6638172380","https://openalex.org/W6639455693"],"related_works":["https://openalex.org/W4235485585","https://openalex.org/W670148","https://openalex.org/W1507420113","https://openalex.org/W4242613270","https://openalex.org/W1969341770","https://openalex.org/W2000386207","https://openalex.org/W2113040119","https://openalex.org/W2004974096","https://openalex.org/W3135894008","https://openalex.org/W2048348735"],"abstract_inverted_index":{"Finite":[0],"field":[1],"arithmetic":[2],"operations":[3],"have":[4],"been":[5],"traditionally":[6],"used":[7],"in":[8,31,105,138],"different":[9],"applications":[10,33],"ranging":[11],"from":[12],"error":[13],"control":[14],"coding":[15],"to":[16,35,67],"cryptographic":[17,147],"computations.":[18],"Among":[19],"these":[20],"computations":[21],"are":[22,29,89,141],"normal":[23,74],"basis":[24,75],"multiplications":[25],"and":[26,39,77,115,134],"exponentiations":[27],"which":[28],"utilized":[30],"efficient":[32],"due":[34],"their":[36],"advantageous":[37],"characteristics":[38],"the":[40,110,132],"fact":[41],"that":[42],"squaring":[43],"(and":[44],"subsequent":[45],"powering":[46],"by":[47],"two)":[48],"of":[49,94,109,112,118],"elements":[50],"can":[51],"be":[52],"obtained":[53],"with":[54],"no":[55],"hardware":[56],"complexity.":[57],"In":[58],"this":[59,139],"paper,":[60],"we":[61],"present":[62],"2-D":[63],"decomposition":[64],"systolic-oriented":[65],"algorithms":[66],"develop":[68],"systolic":[69],"structures":[70,130],"for":[71,91,98,131,143],"digit-level":[72],"Gaussian":[73],"multiplication":[76,133],"exponentiation":[78,135],"over":[79],"GF(2":[80],"<sup":[81],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[82],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">m</sup>":[83],").":[84],"The":[85,107],"proposed":[86],"high-performance":[87,129],"architectures":[88,97,120,136],"suitable":[90,142],"a":[92,122],"number":[93],"applications,":[95],"e.g.,":[96],"elliptic":[99],"curve":[100],"Diffie-Hellman":[101],"key":[102],"agreement":[103],"scheme":[104],"cryptography.":[106],"results":[108],"benchmark":[111],"efficiency,":[113],"performance,":[114],"implementation":[116],"metrics":[117],"such":[119],"through":[121],"65-nm":[123],"application-specific":[124],"integrated":[125],"circuit":[126],"platform":[127],"confirm":[128],"presented":[137],"paper":[140],"high-speed":[144],"architectures,":[145],"including":[146],"applications.":[148]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
