{"id":"https://openalex.org/W2072133092","doi":"https://doi.org/10.1109/vlsisoc.2010.5642663","title":"Low complexity montgomery multiplication architecture for elliptic curve cryptography over GF(p&lt;sup&gt;m&lt;/sup&gt;)","display_name":"Low complexity montgomery multiplication architecture for elliptic curve cryptography over GF(p&lt;sup&gt;m&lt;/sup&gt;)","publication_year":2010,"publication_date":"2010-09-01","ids":{"openalex":"https://openalex.org/W2072133092","doi":"https://doi.org/10.1109/vlsisoc.2010.5642663","mag":"2072133092"},"language":"en","primary_location":{"id":"doi:10.1109/vlsisoc.2010.5642663","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vlsisoc.2010.5642663","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 18th IEEE/IFIP International Conference on VLSI and System-on-Chip","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008243887","display_name":"Somsubhra Talapatra","orcid":null},"institutions":[{"id":"https://openalex.org/I98365261","display_name":"Indian Institute of Engineering Science and Technology, Shibpur","ror":"https://ror.org/02ytfzr55","country_code":"IN","type":"education","lineage":["https://openalex.org/I98365261"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Somsubhra Talapatra","raw_affiliation_strings":["Department of Information Technology, Bengal Engineering and Science University, Howrah, West Bengal, India","Department of Information Technology, Bengal Engineering and Science University (BESU), Shibpur, Howrah-711103, India"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Bengal Engineering and Science University, Howrah, West Bengal, India","institution_ids":["https://openalex.org/I98365261"]},{"raw_affiliation_string":"Department of Information Technology, Bengal Engineering and Science University (BESU), Shibpur, Howrah-711103, India","institution_ids":["https://openalex.org/I98365261"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082934529","display_name":"Hafizur Rahaman","orcid":"https://orcid.org/0000-0001-9012-5437"},"institutions":[{"id":"https://openalex.org/I98365261","display_name":"Indian Institute of Engineering Science and Technology, Shibpur","ror":"https://ror.org/02ytfzr55","country_code":"IN","type":"education","lineage":["https://openalex.org/I98365261"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Hafizur Rahaman","raw_affiliation_strings":["Department of Information Technology, Bengal Engineering and Science University, Howrah, West Bengal, India","Department of Information Technology, Bengal Engineering and Science University (BESU), Shibpur, Howrah-711103, India"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Bengal Engineering and Science University, Howrah, West Bengal, India","institution_ids":["https://openalex.org/I98365261"]},{"raw_affiliation_string":"Department of Information Technology, Bengal Engineering and Science University (BESU), Shibpur, Howrah-711103, India","institution_ids":["https://openalex.org/I98365261"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5008243887"],"corresponding_institution_ids":["https://openalex.org/I98365261"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15534121,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"49","issue":null,"first_page":"219","last_page":"224"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9753999710083008,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.47721558809280396},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4544042944908142},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.3704148530960083},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.36060428619384766},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.35076749324798584},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.34187597036361694},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.33472663164138794},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3161793351173401},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.17354482412338257},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.10359779000282288},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09632283449172974}],"concepts":[{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.47721558809280396},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4544042944908142},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.3704148530960083},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.36060428619384766},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.35076749324798584},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.34187597036361694},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33472663164138794},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3161793351173401},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.17354482412338257},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.10359779000282288},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09632283449172974}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vlsisoc.2010.5642663","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vlsisoc.2010.5642663","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 18th IEEE/IFIP International Conference on VLSI and System-on-Chip","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320337392","display_name":"Division of Electrical, Communications and Cyber Systems","ror":"https://ror.org/01krpsy48"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1562183207","https://openalex.org/W1569612250","https://openalex.org/W1976814282","https://openalex.org/W2004814164","https://openalex.org/W2090210240","https://openalex.org/W2103774873","https://openalex.org/W2106826709","https://openalex.org/W2110692871","https://openalex.org/W2140850958","https://openalex.org/W2150637835","https://openalex.org/W2157024459","https://openalex.org/W2187380582","https://openalex.org/W2922810721","https://openalex.org/W3103339143","https://openalex.org/W4237773356","https://openalex.org/W6683178885","https://openalex.org/W6760620149"],"related_works":["https://openalex.org/W2980963558","https://openalex.org/W1882246857","https://openalex.org/W3103304230","https://openalex.org/W2185360082","https://openalex.org/W1992365905","https://openalex.org/W4287664878","https://openalex.org/W3212023493","https://openalex.org/W1991411408","https://openalex.org/W4288278856","https://openalex.org/W4322486674"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"a":[3,28,180,209,276],"scalable":[4],"VLSI":[5],"multiplication":[6,11],"architecture":[7,102,225,256],"based":[8,234],"on":[9,167],"Montgomery":[10,68],"(MM)":[12],"algorithm":[13,79],"for":[14,179],"elliptic":[15],"curve":[16],"cryptography":[17],"(ECC)":[18],"over":[19,75,82,97,117,157,226],"GF(p":[20,49,83,118,173,196],"<sup":[21,50,84,93,119,174,197,211],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[22,51,85,94,106,110,120,126,131,138,143,175,198,212,239,272],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">m</sup>":[23,52,86,121,176,199],"),":[24,122,214],"where":[25,123,215,236],"p":[26,181],"is":[27,33,43,217,228,241,257],"positive":[29,218],"prime":[30],"and":[31,91,135,140,154,269,288],"m":[32,92,190],"the":[34,39,48,63,73,100,146,168,187,195,223,242,245,250,254],"degree":[35],"of":[36,38,47,62,80,148,162,170,189,206,222,244,253,279,283,291],"extension":[37],"base":[40],"field":[41],"GF(p),":[42,158],"presented.":[44],"The":[45,60,77,160,220],"elements":[46,171,207],")":[53,87,200],"are":[54,65,145],"in":[55,67,172,261],"polynomial":[56],"basis":[57],"(PB)":[58],"representation.":[59],"coefficients":[61],"polynomials":[64],"represented":[66],"residue":[69],"format":[70],"to":[71,114,150,208],"simplify":[72],"multiplications":[74,285],"GF(p).":[76,98],"proposed":[78,101,255],"MM":[81,116,153,224],"requires":[88],"m(m+1)":[89],"MMs":[90],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup>":[95],"additions":[96],"However,":[99],"takes":[103],"{m(m+1)N":[104],"<sub":[105,109,125,130,137,142,238,271],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">mm</sub>":[107,127,139],"+N":[108],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">add</sub>":[111,132,144],"+1}":[112],"cycles":[113,149],"compute":[115],"N":[124,129,136,141,237,270],">":[128],"=":[133],"2,":[134],"numbers":[147],"complete":[151],"an":[152,155,163],"addition":[156],"respectively.":[159],"security":[161],"ECC":[164],"scheme":[165],"depends":[166],"number":[169,205],").":[177],"Hence,":[178],"with":[182,264],"nominal":[183],"bit":[184],"length":[185],"(p\u226b2),":[186],"value":[188],"can":[191],"be":[192],"small,":[193],"but":[194],"still":[201],"contains":[202],"almost":[203],"equal":[204],"GF(2":[210],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">k</sup>":[213],"k":[216],"integer.":[219],"complexity":[221,252],"GF(p)":[227],"reduced":[229],"by":[230],"using":[231],"carry-save-adder":[232],"(CSA)":[233],"implementation,":[235],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">PE</sub>":[240,273],"depth":[243],"CSA.":[246],"Analysis":[247],"shows":[248],"that":[249],"area":[251],"significantly":[258],"less.":[259],"Implementation":[260],"AMS-0.35um":[262],"technology,":[263],"L=30":[265],"(for":[266],"p=536872717),":[267],"m=23":[268],"=8,":[274],"yields":[275],"clock":[277],"frequency":[278],"20.885":[280],"MHz,":[281],"throughput":[282],"6243.68":[284],"per":[286],"second":[287],"power":[289],"consumption":[290],"86.8":[292],"mW":[293],"(at":[294],"20":[295],"MHz).":[296]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
