{"id":"https://openalex.org/W4414199166","doi":"https://doi.org/10.1109/tcad.2025.3610064","title":"Efficient Modular Addition for FPGA-Based Cryptographic Operations","display_name":"Efficient Modular Addition for FPGA-Based Cryptographic Operations","publication_year":2025,"publication_date":"2025-09-15","ids":{"openalex":"https://openalex.org/W4414199166","doi":"https://doi.org/10.1109/tcad.2025.3610064"},"language":"en","primary_location":{"id":"doi:10.1109/tcad.2025.3610064","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcad.2025.3610064","pdf_url":null,"source":{"id":"https://openalex.org/S100835903","display_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","issn_l":"0278-0070","issn":["0278-0070","1937-4151"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114728205","display_name":"Saeid Gorgin","orcid":"https://orcid.org/0009-0005-7574-9766"},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Saeid Gorgin","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Sungkyunkwan University (SKKU), Suwon, Republic of Korea","Department of Electrical and Computer Engineering, Research Professor of computer engineering, SungKyunKwan University (SKKU), Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Sungkyunkwan University (SKKU), Suwon, Republic of Korea","institution_ids":["https://openalex.org/I848706"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Research Professor of computer engineering, SungKyunKwan University (SKKU), Republic of Korea","institution_ids":["https://openalex.org/I848706"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066342538","display_name":"Alireza Vafaei Sadr","orcid":"https://orcid.org/0000-0002-5733-6678"},"institutions":[{"id":"https://openalex.org/I4210146419","display_name":"Institute for Research in Fundamental Sciences","ror":"https://ror.org/04xreqs31","country_code":"IR","type":"facility","lineage":["https://openalex.org/I4210146419"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Amirhossein Sadr","raw_affiliation_strings":["School of Computer Science, Institute for Research in Fundamental Sciences (IPM), Tehran, Iran","School of Computer Science, Researcher, Institute for Research in Fundamental Sciences (IPM), Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Institute for Research in Fundamental Sciences (IPM), Tehran, Iran","institution_ids":["https://openalex.org/I4210146419"]},{"raw_affiliation_string":"School of Computer Science, Researcher, Institute for Research in Fundamental Sciences (IPM), Tehran, Iran","institution_ids":["https://openalex.org/I4210146419"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043762973","display_name":"Dara Rahmati","orcid":null},"institutions":[{"id":"https://openalex.org/I48379061","display_name":"Shahid Beheshti University","ror":"https://ror.org/0091vmj44","country_code":"IR","type":"education","lineage":["https://openalex.org/I48379061"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Dara Rahmati","raw_affiliation_strings":["Department of Computer Science and Engineering, Shahid Beheshti University (SBU), Tehran, Iran","Department of Computer Science and Engineering, Assistant Professor, Shahid Beheshti University (SBU), Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shahid Beheshti University (SBU), Tehran, Iran","institution_ids":["https://openalex.org/I48379061"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Assistant Professor, Shahid Beheshti University (SBU), Tehran, Iran","institution_ids":["https://openalex.org/I48379061"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006710857","display_name":"Ali Jahanian","orcid":"https://orcid.org/0000-0003-2292-4135"},"institutions":[{"id":"https://openalex.org/I48379061","display_name":"Shahid Beheshti University","ror":"https://ror.org/0091vmj44","country_code":"IR","type":"education","lineage":["https://openalex.org/I48379061"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Ali Jahanian","raw_affiliation_strings":["Department of Computer Science and Engineering, Shahid Beheshti University (SBU), Tehran, Iran","Department of Computer Science and Engineering, Associate Professor, Shahid Beheshti University (SBU), Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shahid Beheshti University (SBU), Tehran, Iran","institution_ids":["https://openalex.org/I48379061"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Associate Professor, Shahid Beheshti University (SBU), Tehran, Iran","institution_ids":["https://openalex.org/I48379061"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084281731","display_name":"Jungrae Kim","orcid":"https://orcid.org/0000-0003-1587-0677"},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jungrae Kim","raw_affiliation_strings":["Semiconductor Systems Engineering Department, College of Information and Communication Engineering, Sungkyunkwan University (SKKU), Suwon, Republic of Korea","Semiconductor Systems Engineering Department in College of Information and Communication Engineering, Associate Professor, SungKyunKwan University (SKKU), Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Semiconductor Systems Engineering Department, College of Information and Communication Engineering, Sungkyunkwan University (SKKU), Suwon, Republic of Korea","institution_ids":["https://openalex.org/I848706"]},{"raw_affiliation_string":"Semiconductor Systems Engineering Department in College of Information and Communication Engineering, Associate Professor, SungKyunKwan University (SKKU), Republic of Korea","institution_ids":["https://openalex.org/I848706"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5114728205"],"corresponding_institution_ids":["https://openalex.org/I848706"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12989379,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"45","issue":"4","first_page":"1879","last_page":"1892"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/operand","display_name":"Operand","score":0.9584000110626221},{"id":"https://openalex.org/keywords/adder","display_name":"Adder","score":0.7361999750137329},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.7177000045776367},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7127000093460083},{"id":"https://openalex.org/keywords/modular-arithmetic","display_name":"Modular arithmetic","score":0.6775000095367432},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.4837999939918518},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4489000141620636},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4350999891757965}],"concepts":[{"id":"https://openalex.org/C55526617","wikidata":"https://www.wikidata.org/wiki/Q719375","display_name":"Operand","level":2,"score":0.9584000110626221},{"id":"https://openalex.org/C164620267","wikidata":"https://www.wikidata.org/wiki/Q376953","display_name":"Adder","level":3,"score":0.7361999750137329},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.7177000045776367},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7127000093460083},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7063999772071838},{"id":"https://openalex.org/C32049820","wikidata":"https://www.wikidata.org/wiki/Q319400","display_name":"Modular arithmetic","level":3,"score":0.6775000095367432},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.4837999939918518},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.4562000036239624},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4489000141620636},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4350999891757965},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.42739999294281006},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.40689998865127563},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.4036000072956085},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.31450000405311584},{"id":"https://openalex.org/C184992742","wikidata":"https://www.wikidata.org/wiki/Q7243229","display_name":"Prime (order theory)","level":2,"score":0.31209999322891235},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.30169999599456787},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.29809999465942383},{"id":"https://openalex.org/C97137487","wikidata":"https://www.wikidata.org/wiki/Q729138","display_name":"Integer (computer science)","level":2,"score":0.2962999939918518},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.29409998655319214},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2935999929904938},{"id":"https://openalex.org/C77926391","wikidata":"https://www.wikidata.org/wiki/Q603880","display_name":"Finite field","level":2,"score":0.2858999967575073},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.2827000021934509},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2793000042438507},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.27889999747276306},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.2761000096797943},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.2572999894618988}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcad.2025.3610064","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcad.2025.3610064","pdf_url":null,"source":{"id":"https://openalex.org/S100835903","display_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","issn_l":"0278-0070","issn":["0278-0070","1937-4151"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Modular":[0],"adders":[1,35],"are":[2],"essential":[3],"components":[4,12],"in":[5,13,117,140],"finite":[6],"field":[7],"arithmetic,":[8],"serving":[9],"as":[10,92],"key":[11],"public-key":[14],"cryptographic":[15,180],"algorithms":[16],"like":[17],"Elliptic":[18],"Curve":[19],"Cryptography":[20,24],"(ECC)":[21],"and":[22,57,111,123,166,183],"Post-Quantum":[23],"(PQC).":[25],"Na\u00efve":[26],"implementation":[27],"of":[28,174],"modular":[29,70,107],"adders,":[30],"due":[31],"to":[32,42,147,163],"two":[33],"cascaded":[34],"with":[36],"large":[37],"operand":[38,76,89,151],"bit":[39,152],"widths":[40],"struggle":[41],"meet":[43],"high-frequency":[44],"requirements.":[45],"On":[46],"the":[47,80,114,118,172,175],"other":[48],"hand,":[49],"parallel":[50],"implementations,":[51],"while":[52,154],"faster,":[53],"demand":[54],"excessive":[55],"resources":[56],"power,":[58],"making":[59],"them":[60],"impractical":[61],"for":[62],"many":[63],"applications.":[64],"This":[65],"paper":[66],"introduces":[67],"a":[68,74,99,133],"novel":[69,75],"addition":[71,108,162],"algorithm":[72,104],"leveraging":[73],"representation":[77],"based":[78],"on":[79,132,150],"two-valued":[81],"digit":[82],"encoding":[83],"(Twit).":[84],"In":[85,161],"this":[86],"approach,":[87],"each":[88],"is":[90],"represented":[91],"an":[93],"n-bit":[94],"unsigned":[95],"number":[96],"augmented":[97],"by":[98,109],"Twit":[100],"value":[101,116],"{0,\u00b1\u03b4}.":[102],"The":[103,126],"efficiently":[105],"computes":[106],"speculating":[110],"dynamically":[112],"adjusting":[113],"twit":[115],"result,":[119],"achieving":[120,141],"both":[121],"computational":[122],"resource":[124,157],"efficiency.":[125],"proposed":[127,176],"design":[128],"has":[129],"been":[130],"implemented":[131],"Xilinx":[134],"7-series":[135],"FPGA,":[136],"demonstrating":[137],"superior":[138],"performance":[139],"high":[142],"operating":[143],"frequencies":[144],"(i.e.,":[145,159],"8%":[146],"36%":[148],"depending":[149],"widths)":[153],"significantly":[155],"reducing":[156],"utilization":[158],">36%).":[160],"extensive":[164],"analytical":[165],"synthesis-based":[167],"evaluations,":[168],"we":[169],"further":[170],"demonstrate":[171],"benefits":[173],"adder":[177],"within":[178],"application-level":[179],"datapaths":[181],"(ECC":[182],"PQC).":[184]},"counts_by_year":[],"updated_date":"2026-03-24T05:59:24.953642","created_date":"2025-10-10T00:00:00"}
