{"id":"https://openalex.org/W2052072772","doi":"https://doi.org/10.1109/bmei.2012.6513010","title":"An RSA encryption implementation method using residue signed-digit arithmetic circuits","display_name":"An RSA encryption implementation method using residue signed-digit arithmetic circuits","publication_year":2012,"publication_date":"2012-10-01","ids":{"openalex":"https://openalex.org/W2052072772","doi":"https://doi.org/10.1109/bmei.2012.6513010","mag":"2052072772"},"language":"en","primary_location":{"id":"doi:10.1109/bmei.2012.6513010","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bmei.2012.6513010","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 5th International Conference on BioMedical Engineering and Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102111885","display_name":"Shugang Wei","orcid":null},"institutions":[{"id":"https://openalex.org/I165735259","display_name":"Gunma University","ror":"https://ror.org/046fm7598","country_code":"JP","type":"education","lineage":["https://openalex.org/I165735259"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Shugang Wei","raw_affiliation_strings":["Department of Production Science and Technology, Gunma University, Gunma, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Production Science and Technology, Gunma University, Gunma, Japan","institution_ids":["https://openalex.org/I165735259"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5102111885"],"corresponding_institution_ids":["https://openalex.org/I165735259"],"apc_list":null,"apc_paid":null,"fwci":0.7105,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.81230819,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1299","last_page":"1303"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adder","display_name":"Adder","score":0.807315468788147},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.8046736121177673},{"id":"https://openalex.org/keywords/modular-arithmetic","display_name":"Modular arithmetic","score":0.7849873304367065},{"id":"https://openalex.org/keywords/residue-number-system","display_name":"Residue number system","score":0.5441388487815857},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.4939945340156555},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4908447861671448},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.490313321352005},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.48939767479896545},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4659750163555145},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4598274230957031},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.4232966899871826},{"id":"https://openalex.org/keywords/multiplication","display_name":"Multiplication (music)","score":0.42326897382736206},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3863299489021301},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.35155996680259705},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.29805105924606323},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.28016167879104614},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.0662577748298645}],"concepts":[{"id":"https://openalex.org/C164620267","wikidata":"https://www.wikidata.org/wiki/Q376953","display_name":"Adder","level":3,"score":0.807315468788147},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.8046736121177673},{"id":"https://openalex.org/C32049820","wikidata":"https://www.wikidata.org/wiki/Q319400","display_name":"Modular arithmetic","level":3,"score":0.7849873304367065},{"id":"https://openalex.org/C71480937","wikidata":"https://www.wikidata.org/wiki/Q3086516","display_name":"Residue number system","level":2,"score":0.5441388487815857},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.4939945340156555},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4908447861671448},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.490313321352005},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.48939767479896545},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4659750163555145},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4598274230957031},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.4232966899871826},{"id":"https://openalex.org/C2780595030","wikidata":"https://www.wikidata.org/wiki/Q3860309","display_name":"Multiplication (music)","level":2,"score":0.42326897382736206},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3863299489021301},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.35155996680259705},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.29805105924606323},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.28016167879104614},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0662577748298645},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bmei.2012.6513010","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bmei.2012.6513010","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 5th International Conference on BioMedical Engineering and Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1540606590","https://openalex.org/W1996360405","https://openalex.org/W2015915112","https://openalex.org/W2107021852","https://openalex.org/W2131256658","https://openalex.org/W2145953712","https://openalex.org/W4232836212","https://openalex.org/W6681434030"],"related_works":["https://openalex.org/W1579872621","https://openalex.org/W2771537172","https://openalex.org/W2912881334","https://openalex.org/W1553103133","https://openalex.org/W1968471781","https://openalex.org/W1973181769","https://openalex.org/W2140867083","https://openalex.org/W2784975415","https://openalex.org/W2964271806","https://openalex.org/W4300187176"],"abstract_inverted_index":{"This":[0],"paper":[1],"proposes":[2],"an":[3],"RSA":[4,34],"encryption":[5],"method":[6],"using":[7,82,119],"a":[8,20,25,31,37,65,75,87,116,135,146,155],"sequential":[9],"modular":[10,61,76,148,156],"multiplication":[11],"based":[12,166],"on":[13,167],"residue":[14,73,141],"signed-digit":[15],"(SD)":[16],"number":[17,54,69],"arithmetic.":[18],"For":[19],"large":[21],"modulus":[22,88],"m":[23,43],"with":[24,50,138],"length":[26],"of":[27,39,110],"(p+1)-bit":[28],"used":[29,57],"as":[30],"key":[32],"in":[33,161],"public-key":[35],"cryptosystem,":[36],"complement":[38],"m,":[40],"m*":[41],"=":[42],"-":[44],"2":[45],"<sup":[46],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[47],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">p</sup>":[48],",":[49],"the":[51,60,72,97,103,107,111,123,129,139,168],"p-digit":[52,66],"SD":[53,68,84,112,130,142],"representation":[55],"is":[56,78],"to":[58,101,144],"calculate":[59],"operations.":[62],"By":[63],"introducing":[64],"radix-two":[67],"system":[70],"into":[71],"arithmetic,":[74],"addition":[77],"easily":[79],"implemented":[80],"by":[81],"two":[83],"adders":[85,143],"for":[86,122],"M,":[89],"and":[90,106,126,164],"no":[91],"carry":[92,127],"propagations":[93],"will":[94],"arise":[95],"during":[96],"additions.":[98],"In":[99],"order":[100],"reduce":[102],"hardware":[104],"cost":[105],"delay":[108],"time":[109,163],"adders,":[113],"we":[114],"present":[115],"new":[117,136],"architecture":[118,137],"binary":[120],"numbers":[121],"intermediate":[124],"sum":[125],"within":[128],"adder.":[131],"We":[132],"also":[133],"give":[134],"proposed":[140],"realize":[145],"faster":[147],"multiplication.":[149],"The":[150],"design":[151],"result":[152],"shows":[153],"that":[154],"multiplier":[157],"can":[158],"be":[159],"improved":[160],"computing":[162],"area":[165],"presented":[169],"method.":[170]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
