Bit-Parallel Word-Serial Multiplier in GF(2 233 ) and Its VLSI Implementation. Dr. M. Ahmadi

Size: px
Start display at page:

Download "Bit-Parallel Word-Serial Multiplier in GF(2 233 ) and Its VLSI Implementation. Dr. M. Ahmadi"

Transcription

1 Bt-Parallel Word-Seral Multpler n GF(2 233 ) and Its VLSI Implementaton Supervsors: Student: Dr. Huapeng Wu Dr. M. Ahmad Wenka Tang

2 Contents Introducton to Fnte Feld Research Motvatons Proposed Multplers VLSI Desgn Conclusons References 2

3 Introducton to Fnte Feld Fnte feld A set of fnte number of elements where addton and multplcaton are defned, denoted as GF Eample : GF(2) {,, +, * } * + Multplcaton Addton Eample 2: GF(2 2 ) can be generated by F() 2 ++ where {,} s called a polynomal bass Four elements are: + ( ( ( ( ) ) ) ) 3

4 4 Fnte Feld Multplcaton 2 2 ),...,, ( ),...,, ( m m m m m m b b b b B and a a a a A Let be any two feld elements n GF(2 m ), where }, {, a b 2 ) ( mod ),...,, ( m m j j j m m F b a AB c c c C Then the product Ths s what we want to mplement Eample: GF(2 2 ) s generated by F() 2 ++ Let B A + () () Then () ) ( mod ) ( ) ( ) mod ( ) ( mod ) ( F F F AB C

5 Fnte feld multplers CAB Operand B Bt-parallel fnte feld multpler AND gates: m 2 XOR gates: m 2 - Operand A Product C A, B, C GF(2 5 ) Bt-seral fnte feld multpler Operand B AND gates: m XOR gates: m+ m-bt regsters: 2 Operand A One multplcaton needs m clock cycles A, B, C GF(2 5 ) Product C 5

6 Bt-parallel squarer CA 2 Archtecture Operand A Squarng C Bt-parallel squarer n GF(2 5 ) Gate counts 3 XOR gates 6

7 Research Motvatons Smart card and applcatons Usually a plastc card that contans a securty processor and has many securty related applcatons E-Commerce Personal fnance Health care Campus badges and access Telecommutng and corporate network securty GSM cell phones Lmtatons Low frequency, lmt memory sze Software mplementaton of securty applcaton s slow and nsecure Area constrant 7

8 Smart card and publc key cryptosystem Publc key cryptosystem key echange, dgtal sgnature and encrypton/decrypton Ellptc Curve (EC) over RSA Shorter key length than RSA wth the same securty strength Very sutable for VLSI mplementaton EC s more sutable for smart card EC operatons Fnte feld multplcaton Fnte feld squarng Fnte feld addton We wll desgn a fnte feld multpler for smart card 8

9 Proposed Multplers Choose a fnte feld Degree Polynomal F( ) F ( ) F( ) F( ) F( ) Fnte felds recommended by NIST for ellptc curve systems 9

10 Bt-Parallel Word-Seral (BPWS) Multpler Let {,, 2,, 232 } be the polynomal bass for GF(2 233 ). Let A and B be any two feld elements and A 232 a, where a GF ( 2 ) B 232 b, where b GF ( 2 ) The product s C AB 232 a mod B F ( ) mod F ( )

11 Bt-Parallel Word-Seral (BPWS) Multpler (Cont d) Algorthm: A ( a A 29 a a a7a6... a A A 28 ) Archtecture: 7 6 Let A a + a + + a, for,,..., 29 j + 8 j+ 7 8 j j j Then A 232 a (...( A29 + A28 ) A ) + A C ABmodF( ) (...(( A29B + A28B) + A27B) A B) + A BmodF( ) Let D j A29 j B, for j,,..., 29 C j C j 8 + D j, for j,,...,29, and C Then C C 29

12 Generatng the Product D j A29 j B, for j,,..., 29 C j C j j 8 + D, for j,,...,29, and C Clock cycle Output of M Output of M4 Output D C D D C 8 C 2 D 2 C 8 C 2 28 D 28 C 27 8 C D 29 C 28 8 C 29 C 2

13 M3: Constant multpler γ 8 α Logc equaton Crcut γ α α α α α 5 +,, ,9, ,75,... 82,83, Gate count 8 XOR gates 3

14 M: Partal product generator A j B Functon 7 A j B ( a + a a7 ) B 7 a B + a B a B Components Seven constant multplers Eght AND networks A XOR network 7 4

15 M: Partal product generator (Cont d) Archtecture 5

16 M: Partal product generator (Cont d) Constant multplers j α, j,2,,7. Smlar archtecture as M3 ( 8 α) 6

17 M: Partal product generator (Cont d) AND network 7

18 M: Partal product generator (Cont d) XOR network 7 XOR sub networks M: Sub XOR network 8

19 Alternatve BPWS fnte feld multpler Least sgnfcant word (LSW) frst archtecture One addtonal m-bt regster needed One multplcaton stll needs 3 clock cycles Archtecture: 9

20 General BPWS fnte feld multpler Fnte feld: GF(2 m ) Word sze: p Components: -One p m partal product generator -One adder (m XOR gates) -One constant FFM -One m-bt regster 2

21 Comparsons Multpler Fnte feld Speed (Clock cycle) Crcut complety Parallel GF(2 233 ) AND gates XOR gates Seral 233 two 233-bt regsters 233 AND gates 234 XOR gates Proposed 3 8*233 AND gates BPWS 8* XOR gates one 233-bt regster Alternatve 3 8*233 AND gates BPWS 8* XOR gates Two 233-bt regsters General BPWS Trnomal GF(2 m ) Celng functon of (m/p) p*m AND gates p*m+(p+)p/2 XOR gates (<k<m/2 One m-bt regster p word wdth) 2

22 Target VLSI Desgn ASIC chp whch can perform multplcaton and squarng n GF(2 233 ) Specfcatons Frequency: 5MHz Gate counts: 4 Desgn flow CMC dgtal desgn flow Technology TSMC.8 µm CMOS technology 22

23 Hardware schematc 23

24 Fnal results and comparsons Multpler Frequency (MHz) Feld sze # of cells Gate counts Area (µm 2 ) VLSI technology BPWS (ma. 3) TSMC.8µm CMOS Squarer Classcal [] LUTs FFs N/A Xln FPGA XC2V6- ff57-4 Hans et al MSD [2] LUTs 2948 FFs 3664 N/A Xln FPGA Vrte-II XCV2E-7 Souch et al 8288 [3] *8*288 ANDs 2*8*288 XORs 3*(8+288) FFs 4544 N/A ALTERA FPGA EPFK25AG C

25 Chp Layout 25

26 Conclusons Bt-parallel word-seral multpler archtectures are proposed. The proposed archtectures are not only useful for smart card but also benefcal to other securty processors. An ASIC chp whch has the proposed BPWS multpler and bt parallel squarer s mplemented. A novel 8233 partal product generator s desgned. Future work epected s to use ths multpler n securty processor for smart card. 26

27 References [] Grabbe C.,Bednara M., Tech J.,Von Zur Gathen J., Shokrollah J, FPGA desgns of parallel hgh performance GF(2^233) multplers, Crcuts and Systems, 23. ISCAS '3. Proceedngs of the 23 Internatonal Symposum on, Volume: 2, May 23 [2] Hans Eberle, Sheuelng Chang, Nls Gura, Sumt Gupta, Dnel Fnchelsten, Edouard Goupy, Douglas Stebla, An End-to-End Systems Approach to Ellptc Curve Cryptography Sun Mcrosytems Laboratores [3] Souch Okada, Naoya Tor, Kouch Itoh, Masahko Takenaka, Implementaton of Ellptc Curve Cryptographc Coprocessor over GF(2^m) on an FPGA ', C.K. Koc and C. Paar (Eds.): CHES 2, LNCS 965, pp. 25-4, 2. Sprnger-Verlag Berln Hedelberg 2 27

28 Queston? 28

29 THANK YOU! 29

A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2 n )

A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2 n ) Reconfgurable System on Chp Implementaton for Ellptc Curve Cryptography over GF( n ) Mchael Jung, M. Ernst, F. Madlener, S. Huss, R. lümel Integrated Crcuts and Systems Lab Computer Scence Department Darmstadt

More information

TOPICS MULTIPLIERLESS FILTER DESIGN ELEMENTARY SCHOOL ALGORITHM MULTIPLICATION

TOPICS MULTIPLIERLESS FILTER DESIGN ELEMENTARY SCHOOL ALGORITHM MULTIPLICATION 1 2 MULTIPLIERLESS FILTER DESIGN Realzaton of flters wthout full-fledged multplers Some sldes based on support materal by W. Wolf for hs book Modern VLSI Desgn, 3 rd edton. Partly based on followng papers:

More information

The Improved Montgomery Scalar Multiplication Algorithm with DPA Resistance Yanqi Xu, Lin Chen, Moran Li

The Improved Montgomery Scalar Multiplication Algorithm with DPA Resistance Yanqi Xu, Lin Chen, Moran Li nd Internatonal Conference on Electrcal, Computer Engneerng and Electroncs (ICECEE 015) The Improved Montgomery Scalar Multplcaton Algorthm wth DPA Resstance Yanq Xu, Ln Chen, Moran L Informaton Scence

More information

A New Design of Multiplier using Modified Booth Algorithm and Reversible Gate Logic

A New Design of Multiplier using Modified Booth Algorithm and Reversible Gate Logic Internatonal Journal of Computer Applcatons Technology and Research A New Desgn of Multpler usng Modfed Booth Algorthm and Reversble Gate Logc K.Nagarjun Department of ECE Vardhaman College of Engneerng,

More information

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification Desgn Project Specfcaton Medan Flter Department of Electrcal & Electronc Engneeng Imperal College London E4.20 Dgtal IC Desgn Medan Flter Project Specfcaton A medan flter s used to remove nose from a sampled

More information

Performance Analysis of the Postcomputation- Based Generic-Point Parallel Scalar Multiplication Method

Performance Analysis of the Postcomputation- Based Generic-Point Parallel Scalar Multiplication Method P a g e 3 Vol. 1 Issue 11 (Ver. 1.) October 1 Global Journal of Computer Scence and Technology Performance Analyss of the Postcomputaton- Based Generc-Pont Parallel Scalar Multplcaton Method Tur F. Al-Soman

More information

FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials

FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials C. Shu, S. Kwon and K. Gaj Abstract: The efficient design of digit-serial multipliers

More information

Scalable RSA Processor in Reconfigurable Hardware - a SoC Building Block

Scalable RSA Processor in Reconfigurable Hardware - a SoC Building Block Scalable RSA Processor n Reconfgurable Hardare - a SoC Buldng Block Vktor Fscher and Mloš Drutarovský Laboratore ratement du Sgnal et Instrumentaton, Unté Mxte de Recherche CNRS 556, Unversté Jean Monnet,

More information

DESIGN OF A COMPACT MODULAR EXPONENTIATION ACCELERATOR FOR MODERN FPGA DEVICES

DESIGN OF A COMPACT MODULAR EXPONENTIATION ACCELERATOR FOR MODERN FPGA DEVICES Copyrght - World Automaton Congress (WAC) 2006, July 24-26, Budapest, Hungary DESIGN OF A COMPACT MODULAR EXPONENTIATION ACCELERATOR FOR MODERN FPGA DEVICES Tmo Alho, Tampere Unv. of Tech., Fnland, tmo.a.alho@tut.f

More information

Power Efficient Design and Implementation of a Novel Constant Correction Truncated Multiplier

Power Efficient Design and Implementation of a Novel Constant Correction Truncated Multiplier APSIPA ASC 11 X an Power Effcent Desgn and Implementaton of a Novel Constant Correcton Truncated Multpler Yu Ren, Dong Wang, Lebo Lu, Shouy Yn and Shaojun We Tsnghua Unversty, Bejng E-mal: reneereny@gmal.com

More information

The stream cipher MICKEY

The stream cipher MICKEY The stream cpher MICKEY-128 2.0 Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net 30 th June 2006 Abstract: We

More information

RSA /2002/13(08) , ); , ) RSA RSA : RSA RSA [2] , [1,4]

RSA /2002/13(08) , ); , )     RSA RSA : RSA RSA [2] , [1,4] 1000-9825/2002/13(081729-06 2002 Journal of Software Vol13, No8 RSA 1,2 1, 1 (, 200433; 2 (, 200070 E-mal: yfhu@fudaneducn http://wwwfudaneducn : RSA RSA :, ; RSA,,, RSA,, : ; RSA ; ;RSA; : TP309 : A RSA

More information

Implementation of Parallel Multiplier Accumulator based on Radix-2 Modified Booth Algorithm Shashi Prabha Singh 1 Uma Sharma 2

Implementation of Parallel Multiplier Accumulator based on Radix-2 Modified Booth Algorithm Shashi Prabha Singh 1 Uma Sharma 2 IJSRD - Internatonal Journal for Scentfc Research & Development Vol. 3, Issue 05, 2015 ISSN (onlne): 2321-0613 Implementaton of Parallel Multpler Accumulator based on Radx-2 Modfed Booth Algorthm Shash

More information

FPGA Implementation of Pipelined CORDIC Sine Cosine Digital Wave Generator

FPGA Implementation of Pipelined CORDIC Sine Cosine Digital Wave Generator FPGA Implementaton of Ppelned CORDIC Sne Cosne Dgtal Wave Generator Navdeep Prashar 1 and Balwnder Sngh 1- Acadmc and Consultancy Servces Dvson, Centre for Development of Advanced Computng(C-DAC, Mohal,

More information

Towards strong security in embedded and pervasive systems: energy and area optimized serial polynomial multipliers in GF(2 k )

Towards strong security in embedded and pervasive systems: energy and area optimized serial polynomial multipliers in GF(2 k ) Towards strong securty n ebedded and pervasve systes: energy and area optzed seral polynoal ultplers n GF( k ) Zoya Dyka, Peter Langendoerfer, Frank Vater and Steffen Peter IHP, I Technologepark 5, D-53

More information

Lecture 5, October 8. DES System (Modification)

Lecture 5, October 8. DES System (Modification) Lecture 5, October 8. 10/10/01 Gene Tsudk, ICS 268 Fall 2001 1 Encrypton Process 64 Bt Plantext Intal Permutaton 32 Bt L0 32 Bt R0 + F(R0,K1) DES System (Modfcaton) Festel Network Buldng Block Key Schedule

More information

A Novel, Low-Power Array Multiplier Architecture

A Novel, Low-Power Array Multiplier Architecture A Noel, Low-Power Array Multpler Archtecture by Ronak Bajaj, Saransh Chhabra, Sreehar Veeramachanen, MB Srnas n 9th Internatonal Symposum on Communcaton and Informaton Technology 29 (ISCIT 29) Songdo -

More information

Implementation Options for Finite Field Arithmetic for Elliptic Curve Cryptosystems Christof Paar Electrical & Computer Engineering Dept. and Computer Science Dept. Worcester Polytechnic Institute Worcester,

More information

CSE4210 Architecture and Hardware for DSP

CSE4210 Architecture and Hardware for DSP 4210 Archtecture and Hardware for DSP Lecture 1 Introducton & Number systems Admnstratve Stuff 4210 Archtecture and Hardware for DSP Text: VLSI Dgtal Sgnal Processng Systems: Desgn and Implementaton. K.

More information

Quadratic speedup for unstructured search - Grover s Al-

Quadratic speedup for unstructured search - Grover s Al- Quadratc speedup for unstructured search - Grover s Al- CS 94- gorthm /8/07 Sprng 007 Lecture 11 001 Unstructured Search Here s the problem: You are gven a boolean functon f : {1,,} {0,1}, and are promsed

More information

Lecture 4: Adders. Computer Systems Laboratory Stanford University

Lecture 4: Adders. Computer Systems Laboratory Stanford University Lecture 4: Adders Computer Systems Laboratory Stanford Unversty horowtz@stanford.edu Copyrght 2004 by Mark Horowtz (w/ Fgures from Hgh-Performance Mcroprocessor Desgn IEEE And Fgures from Bora Nkolc 1

More information

Are standards compliant Elliptic Curve Cryptosystems feasible on RFID?

Are standards compliant Elliptic Curve Cryptosystems feasible on RFID? Are standards compliant Elliptic Curve Cryptosystems feasible on RFID? Sandeep S. Kumar and Christof Paar Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany Abstract. With elliptic

More information

Module #6: Combinational Logic Design with VHDL Part 2 (Arithmetic)

Module #6: Combinational Logic Design with VHDL Part 2 (Arithmetic) ECOM4311 Dgtal Systems Desgn : Combnatonal Logc Desgn wth VHDL Part 2 (Arthmetc) - A crcut that compares dgtal values (.e., Equal, Greater Than, Less Than) Agenda 1. 2. Adders (Rpple Carry, Carry-Look-Ahead)

More information

High-Speed Low-Complexity Reed-Solomon Decoder using Pipelined Berlekamp-Massey Algorithm and Its Folded Architecture

High-Speed Low-Complexity Reed-Solomon Decoder using Pipelined Berlekamp-Massey Algorithm and Its Folded Architecture JOURNAL OF SEMICONUCTOR TECHNOLOGY AN SCIENCE, VOL., NO.3, SEPTEMBER, 2 93 Hgh-Speed Low-Complexty Reed-Solomon ecoder usng Ppelned Berlekamp-Massey Algorthm and Its Folded Archtecture Jeong-In Park, Khoon

More information

AN IMPROVED LOW LATENCY SYSTOLIC STRUCTURED GALOIS FIELD MULTIPLIER

AN IMPROVED LOW LATENCY SYSTOLIC STRUCTURED GALOIS FIELD MULTIPLIER Indian Journal of Electronics and Electrical Engineering (IJEEE) Vol.2.No.1 2014pp1-6 available at: www.goniv.com Paper Received :05-03-2014 Paper Published:28-03-2014 Paper Reviewed by: 1. John Arhter

More information

Cube Attack on Reduced-Round Quavium

Cube Attack on Reduced-Round Quavium 3rd Internatonal onference on Mechatroncs and Industral Informatcs (IMII 05 ube Attac on Reduced-Round Quavum Shyong Zhang, a *, Gonglang hen,b and Janhua L,c School of Informaton Securty Engneerng, Shangha

More information

Some Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM

Some Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM Example of Extended Eucldean Algorthm Recall that gcd(84, 33) = gcd(33, 18) = gcd(18, 15) = gcd(15, 3) = gcd(3, 0) = 3 We work backwards to wrte 3 as a lnear combnaton of 84 and 33: 3 = 18 15 [Now 3 s

More information

PART 8. Partial Differential Equations PDEs

PART 8. Partial Differential Equations PDEs he Islamc Unverst of Gaza Facult of Engneerng Cvl Engneerng Department Numercal Analss ECIV 3306 PAR 8 Partal Dfferental Equatons PDEs Chapter 9; Fnte Dfference: Ellptc Equatons Assocate Prof. Mazen Abualtaef

More information

High Performance Rotation Architectures Based on the Radix-4 CORDIC Algorithm

High Performance Rotation Architectures Based on the Radix-4 CORDIC Algorithm IEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 8, AUGUST 997 855 Hgh Performance Rotaton Archtectures Based on the Radx-4 CORDIC Algorthm Elsardo Antelo, Julo Vllalba, Javer D. Bruguera, and Emlo L. Zapata

More information

Efficient FPGA-based Karatsuba multipliers for polynomials over F 2

Efficient FPGA-based Karatsuba multipliers for polynomials over F 2 JOACHIM VON ZUR GATHEN & JAMSHID SHOKROLLAHI (2005). Efficient FPGA-based Karatsuba multipliers for polynomials over F2. In Selected Areas in Cryptography (SAC 2005), BART PRENEEL & STAFFORD TAVARES, editors,

More information

A Fast FPGA based Architecture for Determining the Sine and Cosine Value

A Fast FPGA based Architecture for Determining the Sine and Cosine Value Proc. of Int. Conf. on Advances n Communcaton, Network, and Computng, CNC A Fast FPGA based Archtecture for Determnng the Sne and Cosne Value Atanu Dey, Tanma Bhattacharyya, Abul Hasnat and Santanu Halder

More information

Lecture 10 Support Vector Machines II

Lecture 10 Support Vector Machines II Lecture 10 Support Vector Machnes II 22 February 2016 Taylor B. Arnold Yale Statstcs STAT 365/665 1/28 Notes: Problem 3 s posted and due ths upcomng Frday There was an early bug n the fake-test data; fxed

More information

Logic effort and gate sizing

Logic effort and gate sizing EEN454 Dgtal Integrated rcut Desgn Logc effort and gate szng EEN 454 Introducton hp desgners face a bewlderng arra of choces What s the best crcut topolog for a functon? How man stages of logc gve least

More information

Post-quantum Key Exchange Protocol Using High Dimensional Matrix

Post-quantum Key Exchange Protocol Using High Dimensional Matrix Post-quantum Key Exchange Protocol Usng Hgh Dmensonal Matrx Rchard Megrelshvl I. J. Tbls State Unversty rchard.megrelshvl@tsu.ge Melksadeg Jnkhadze Akak Tseretel State Unversty Kutas, Georga mn@yahoo.com

More information

A Low Error and High Performance Multiplexer-Based Truncated Multiplier

A Low Error and High Performance Multiplexer-Based Truncated Multiplier IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 18, NO. 1, DECEMBER 010 1767 A Low Error and Hgh Performance Multplexer-Based Truncated Multpler Chp-Hong Chang and Rav Kumar Satzoda

More information

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work

More information

Parallel MAC Based On Radix-4 & Radix-8 Booth Encodings

Parallel MAC Based On Radix-4 & Radix-8 Booth Encodings Shankey Goel. et al. / Internatonal Journal of Engneerng Scence an Technology (IJEST) Parallel MAC Base On Rax-4 & Rax-8 Booth Encongs SHAKE GOEL Stuent, Department of Electroncs & Communcaton Engneerng

More information

Improving XOR-Dominated Circuits by Exploiting Dependencies between Operands

Improving XOR-Dominated Circuits by Exploiting Dependencies between Operands Improvng XOR-Domnated Crcuts by Explotng Dependences between Operands Ajay K. Verma AjayKumar.Verma@epfl.ch Paolo Ienne Paolo.Ienne@epfl.ch Ecole Polytechnque Fédérale de Lausanne (EPFL) School of Computer

More information

An Efficient Eligible Error Locator Polynomial Searching Algorithm and Hardware Architecture for One-Pass Chase BCH Codes Decoding

An Efficient Eligible Error Locator Polynomial Searching Algorithm and Hardware Architecture for One-Pass Chase BCH Codes Decoding Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. Ctaton nformaton: DOI.9/TCSII.6.58587, IEEE An Effcent

More information

Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations

Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations Use of Sparse and/or Complex Exponents n Batch Verfcaton of Exponentatons Jung Hee Cheon 1 and Dong Hoon Lee 2 1 Department of Mathematcs, Seoul Natonal Unversty jhcheon@math.snu.ac.kr, 2 Natonal Securty

More information

Message modification, neutral bits and boomerangs

Message modification, neutral bits and boomerangs Message modfcaton, neutral bts and boomerangs From whch round should we start countng n SHA? Antone Joux DGA and Unversty of Versalles St-Quentn-en-Yvelnes France Jont work wth Thomas Peyrn 1 Dfferental

More information

= z 20 z n. (k 20) + 4 z k = 4

= z 20 z n. (k 20) + 4 z k = 4 Problem Set #7 solutons 7.2.. (a Fnd the coeffcent of z k n (z + z 5 + z 6 + z 7 + 5, k 20. We use the known seres expanson ( n+l ( z l l z n below: (z + z 5 + z 6 + z 7 + 5 (z 5 ( + z + z 2 + z + 5 5

More information

Introduction to Density Functional Theory. Jeremie Zaffran 2 nd year-msc. (Nanochemistry)

Introduction to Density Functional Theory. Jeremie Zaffran 2 nd year-msc. (Nanochemistry) Introducton to Densty Functonal Theory Jereme Zaffran nd year-msc. (anochemstry) A- Hartree appromatons Born- Oppenhemer appromaton H H H e The goal of computatonal chemstry H e??? Let s remnd H e T e

More information

A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2 m )

A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2 m ) A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2 m ) Stefan Tillich, Johann Großschädl Institute for Applied Information Processing and

More information

Estimating Delays. Gate Delay Model. Gate Delay. Effort Delay. Computing Logical Effort. Logical Effort

Estimating Delays. Gate Delay Model. Gate Delay. Effort Delay. Computing Logical Effort. Logical Effort Estmatng Delas Would be nce to have a back of the envelope method for szng gates for speed Logcal Effort ook b Sutherland, Sproull, Harrs Chapter s on our web page Gate Dela Model Frst, normalze a model

More information

Hardware Implementation of Elliptic Curve Cryptography over Binary Field

Hardware Implementation of Elliptic Curve Cryptography over Binary Field I. J. Computer Network and Information Security, 2012, 2, 1-7 Published Online March 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2012.02.01 Hardware Implementation of Elliptic Curve Cryptography

More information

EEE 241: Linear Systems

EEE 241: Linear Systems EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they

More information

A Hybrid Variational Iteration Method for Blasius Equation

A Hybrid Variational Iteration Method for Blasius Equation Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method

More information

HIGH-SPEED MULTI OPERAND ADDITION UTILIZING FLAG BITS VIBHUTI DAVE DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING

HIGH-SPEED MULTI OPERAND ADDITION UTILIZING FLAG BITS VIBHUTI DAVE DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING HIGH-SPEED MULTI OPERAND ADDITION UTILIZING FLAG BITS BY VIBHUTI DAVE DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING Submtted n partal fulfllment of the requrements for the degree of Doctor of Phlosophy

More information

Montgomery Multiplier and Squarer in GF(2 m )

Montgomery Multiplier and Squarer in GF(2 m ) Montgomery Multiplier and Squarer in GF( m ) Huapeng Wu The Centre for Applied Cryptographic Research Department of Combinatorics and Optimization University of Waterloo, Waterloo, Canada h3wu@cacrmathuwaterlooca

More information

Implementation and Study of Reversible Binary Comparators

Implementation and Study of Reversible Binary Comparators Implementaton and Study of Reversble Bnary Comparators Harth M, C Vasanthanayak Abstract Reversble logc contans a feature of recoverng bt loss from unque nput-output mappng. Usng tradtonal (rreversble)

More information

RISC Processors. Hierarchical VLSI Design. Multiple Layered Architecture. 6. Case Study: Formal Verification of RISC Processors using HOL

RISC Processors. Hierarchical VLSI Design. Multiple Layered Architecture. 6. Case Study: Formal Verification of RISC Processors using HOL 6. Case Study: Formal Verfcaton of RISC Processors usng HOL RISC Processors Motvaton RISC Verfcaton Model Dervng Formal Specfcatons Verfcaton Tasks Ppelne Correctness Processor Specfc Defntons Expermental

More information

ABHELSINKI UNIVERSITY OF TECHNOLOGY

ABHELSINKI UNIVERSITY OF TECHNOLOGY On Repeated Squarings in Binary Fields Kimmo Järvinen Helsinki University of Technology August 14, 2009 K. Järvinen On Repeated Squarings in Binary Fields 1/1 Introduction Repeated squaring Repeated squaring:

More information

Variability-Driven Module Selection with Joint Design Time Optimization and Post-Silicon Tuning

Variability-Driven Module Selection with Joint Design Time Optimization and Post-Silicon Tuning Asa and South Pacfc Desgn Automaton Conference 2008 Varablty-Drven Module Selecton wth Jont Desgn Tme Optmzaton and Post-Slcon Tunng Feng Wang, Xaoxa Wu, Yuan Xe The Pennsylvana State Unversty Department

More information

A MORE SECURE MFE MULTIVARIATE PUBLIC KEY ENCRYPTION SCHEME *

A MORE SECURE MFE MULTIVARIATE PUBLIC KEY ENCRYPTION SCHEME * Internatonal Journal of Computer Scence and Applcatons Vol No pp - 00 Technomathematcs Research Foundaton A ORE SECURE FE ULTIVARIATE PUBLIC KE ENCRPTION SCHEE n Wang School of Telecommuncatons Engneerng

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

Design and Performance testing of Arithmetic Operators Library for Cryptographic Applications

Design and Performance testing of Arithmetic Operators Library for Cryptographic Applications IJCSES Internatonal Journal of Coputer Scences and Engneerng Systes, Vol., No.3, July 7 CSES Internatonal c7 ISSN 973-446 Desgn and Perforance testng of Arthetc Operators Lbrary for Cryptographc Applcatons

More information

Semi-supervised Classification with Active Query Selection

Semi-supervised Classification with Active Query Selection Sem-supervsed Classfcaton wth Actve Query Selecton Jao Wang and Swe Luo School of Computer and Informaton Technology, Beng Jaotong Unversty, Beng 00044, Chna Wangjao088@63.com Abstract. Labeled samples

More information

Efficient Fixed Base Exponentiation and Scalar Multiplication based on a Multiplicative Splitting Exponent Recoding

Efficient Fixed Base Exponentiation and Scalar Multiplication based on a Multiplicative Splitting Exponent Recoding Effcent Fxed Base Exponentaton and Scalar Multplcaton based on a Multplcatve Splttng Exponent Recodng Jean-Marc Robert, Chrstophe Negre, Thomas Plantard To cte ths verson: Jean-Marc Robert, Chrstophe Negre,

More information

Exercises. 18 Algorithms

Exercises. 18 Algorithms 18 Algorthms Exercses 0.1. In each of the followng stuatons, ndcate whether f = O(g), or f = Ω(g), or both (n whch case f = Θ(g)). f(n) g(n) (a) n 100 n 200 (b) n 1/2 n 2/3 (c) 100n + log n n + (log n)

More information

REDUCTION MODULO p. We will prove the reduction modulo p theorem in the general form as given by exercise 4.12, p. 143, of [1].

REDUCTION MODULO p. We will prove the reduction modulo p theorem in the general form as given by exercise 4.12, p. 143, of [1]. REDUCTION MODULO p. IAN KIMING We wll prove the reducton modulo p theorem n the general form as gven by exercse 4.12, p. 143, of [1]. We consder an ellptc curve E defned over Q and gven by a Weerstraß

More information

Suppose that there s a measured wndow of data fff k () ; :::; ff k g of a sze w, measured dscretely wth varable dscretzaton step. It s convenent to pl

Suppose that there s a measured wndow of data fff k () ; :::; ff k g of a sze w, measured dscretely wth varable dscretzaton step. It s convenent to pl RECURSIVE SPLINE INTERPOLATION METHOD FOR REAL TIME ENGINE CONTROL APPLICATIONS A. Stotsky Volvo Car Corporaton Engne Desgn and Development Dept. 97542, HA1N, SE- 405 31 Gothenburg Sweden. Emal: astotsky@volvocars.com

More information

On the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros

On the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros Appled Mathematcal Scences, Vol. 5, 2011, no. 75, 3693-3706 On the Interval Zoro Symmetrc Sngle-step Procedure for Smultaneous Fndng of Polynomal Zeros S. F. M. Rusl, M. Mons, M. A. Hassan and W. J. Leong

More information

Representations of Elementary Functions Using Binary Moment Diagrams

Representations of Elementary Functions Using Binary Moment Diagrams Representatons of Elementary Functons Usng Bnary Moment Dagrams Tsutomu Sasao Department of Computer Scence and Electroncs, Kyushu Insttute of Technology Izua 82-852, Japan Shnobu Nagayama Department of

More information

2 More examples with details

2 More examples with details Physcs 129b Lecture 3 Caltech, 01/15/19 2 More examples wth detals 2.3 The permutaton group n = 4 S 4 contans 4! = 24 elements. One s the dentty e. Sx of them are exchange of two objects (, j) ( to j and

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

Dual-Field Arithmetic Unit for GF(p) and GF(2 m ) *

Dual-Field Arithmetic Unit for GF(p) and GF(2 m ) * Institute for Applied Information Processing and Communications Graz University of Technology Dual-Field Arithmetic Unit for GF(p) and GF(2 m ) * CHES 2002 Workshop on Cryptographic Hardware and Embedded

More information

Fast arithmetic for polynomials over F 2 in hardware

Fast arithmetic for polynomials over F 2 in hardware Fast arithmetic for polynomials over F 2 in hardware JOACHIM VON ZUR GATHEN & JAMSHID SHOKROLLAHI (200). Fast arithmetic for polynomials over F2 in hardware. In IEEE Information Theory Workshop (200),

More information

A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases

A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases Arash Reyhani-Masoleh Department of Electrical and Computer Engineering The University of Western Ontario London, Ontario,

More information

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,

More information

Aging model for a 40 V Nch MOS, based on an innovative approach F. Alagi, R. Stella, E. Viganò

Aging model for a 40 V Nch MOS, based on an innovative approach F. Alagi, R. Stella, E. Viganò Agng model for a 4 V Nch MOS, based on an nnovatve approach F. Alag, R. Stella, E. Vganò ST Mcroelectroncs Cornaredo (Mlan) - Italy Agng modelng WHAT IS AGING MODELING: Agng modelng s a tool to smulate

More information

Over-Temperature protection for IGBT modules

Over-Temperature protection for IGBT modules Over-Temperature protecton for IGBT modules Ke Wang 1, Yongjun Lao 2, Gaosheng Song 1, Xanku Ma 1 1 Mtsubsh Electrc & Electroncs (Shangha) Co., Ltd., Chna Room2202, Tower 3, Kerry Plaza, No.1-1 Zhongxns

More information

Algebraic properties of polynomial iterates

Algebraic properties of polynomial iterates Algebrac propertes of polynomal terates Alna Ostafe Department of Computng Macquare Unversty 1 Motvaton 1. Better and cryptographcally stronger pseudorandom number generators (PRNG) as lnear constructons

More information

Exhaustive Search for the Binary Sequences of Length 2047 and 4095 with Ideal Autocorrelation

Exhaustive Search for the Binary Sequences of Length 2047 and 4095 with Ideal Autocorrelation Exhaustve Search for the Bnary Sequences of Length 047 and 4095 wth Ideal Autocorrelaton 003. 5. 4. Seok-Yong Jn and Hong-Yeop Song. Yonse Unversty Contents Introducton Background theory Ideal autocorrelaton

More information

Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Cryptology, Tuesday, February 27th, 2007 Nils Andersen. Complexity Theoretic Reduction

Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Cryptology, Tuesday, February 27th, 2007 Nils Andersen. Complexity Theoretic Reduction Attacks on RSA The Rabn Cryptosystem Semantc Securty of RSA Cryptology, Tuesday, February 27th, 2007 Nls Andersen Square Roots modulo n Complexty Theoretc Reducton Factorng Algorthms Pollard s p 1 Pollard

More information

Augmented Broadcaster Identity-based Broadcast Encryption

Augmented Broadcaster Identity-based Broadcast Encryption Augmented Broadcaster Identty-based Broadcast Encrypton Janhong Zhang Yuwe Xu Zhpeng Chen Insttuton of Image Processng and Pattern Recognton North Chna Unversty of Technology Bejng Chna 100144 ywxupaper@163com

More information

CHAPTER 4 MAX-MIN AVERAGE COMPOSITION METHOD FOR DECISION MAKING USING INTUITIONISTIC FUZZY SETS

CHAPTER 4 MAX-MIN AVERAGE COMPOSITION METHOD FOR DECISION MAKING USING INTUITIONISTIC FUZZY SETS 56 CHAPER 4 MAX-MIN AVERAGE COMPOSIION MEHOD FOR DECISION MAKING USING INUIIONISIC FUZZY SES 4.1 INRODUCION Intutonstc fuzz max-mn average composton method s proposed to construct the decson makng for

More information

One-sided finite-difference approximations suitable for use with Richardson extrapolation

One-sided finite-difference approximations suitable for use with Richardson extrapolation Journal of Computatonal Physcs 219 (2006) 13 20 Short note One-sded fnte-dfference approxmatons sutable for use wth Rchardson extrapolaton Kumar Rahul, S.N. Bhattacharyya * Department of Mechancal Engneerng,

More information

Probability-Theoretic Junction Trees

Probability-Theoretic Junction Trees Probablty-Theoretc Juncton Trees Payam Pakzad, (wth Venkat Anantharam, EECS Dept, U.C. Berkeley EPFL, ALGO/LMA Semnar 2/2/2004 Margnalzaton Problem Gven an arbtrary functon of many varables, fnd (some

More information

Impossible differential attacks on 4-round DES-like ciphers

Impossible differential attacks on 4-round DES-like ciphers INENAIONA JOUNA OF COMPUES AND COMMUNICAIONS Volume 9, 2015 Impossble dfferental attacks on 4-round DES-lke cphers Pavol Zajac Abstract Data Encrypton Standard was a man publc encrypton standard for more

More information

Combinational Circuit Design

Combinational Circuit Design Combnatonal Crcut Desgn Part I: Desgn Procedure and Examles Part II : Arthmetc Crcuts Part III : Multlexer, Decoder, Encoder, Hammng Code Combnatonal Crcuts n nuts Combnatonal Crcuts m oututs A combnatonal

More information

Theoretical Modeling of the Itoh-Tsujii Inversion Algorithm for Enhanced Performance on k-lut based FPGAs

Theoretical Modeling of the Itoh-Tsujii Inversion Algorithm for Enhanced Performance on k-lut based FPGAs Theoretical Modeling of the Itoh-Tsujii Inversion Algorithm for Enhanced Performance on k-lut based FPGAs Sujoy Sinha Roy, Chester Rebeiro and Debdeep Mukhopadhyay Department of Computer Science and Engineering

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

Hardware Implementation of Elliptic Curve Processor over GF (p)

Hardware Implementation of Elliptic Curve Processor over GF (p) Hardware Implementation of Elliptic Curve Processor over GF (p) Sıddıka Berna Örs, Lejla Batina, Bart Preneel K.U. Leuven ESAT/COSIC Kasteelpark Arenberg 10 B-3001 Leuven-Heverlee, Belgium {Siddika.BernaOrs,

More information

Fast Variants of RSA

Fast Variants of RSA Fast Varants of RSA Dan Boneh dabo@cs.stanford.edu Hovav Shacham hovav@cs.stanford.edu Abstract We survey four varants of RSA desgned to speed up RSA decrypton and sgnng. We only consder varants that are

More information

Discussion 11 Summary 11/20/2018

Discussion 11 Summary 11/20/2018 Dscusson 11 Summary 11/20/2018 1 Quz 8 1. Prove for any sets A, B that A = A B ff B A. Soluton: There are two drectons we need to prove: (a) A = A B B A, (b) B A A = A B. (a) Frst, we prove A = A B B A.

More information

Design and Implementation of a Low Power RSA Processor for Smartcard

Design and Implementation of a Low Power RSA Processor for Smartcard I.J.Modern Education and Computer Science, 2011, 3, 8-14 Published Online June 2011 in MECS (http://www.mecs-press.org/) esign and Implementation of a Low Power RSA Processor for Smartcard Zhen Huang Institute

More information

Research Article On the Use of an Algebraic Signature Analyzer for Mixed-Signal Systems Testing

Research Article On the Use of an Algebraic Signature Analyzer for Mixed-Signal Systems Testing VLSI Desgn, Artcle ID 46597, 8 pages http://dx.do.org/.55/24/46597 Research Artcle On the Use of an Algebrac Sgnature Analyzer for Mxed-Sgnal Systems Testng Vadm Geurkov and Lev Krschan Department of Electrcal

More information

LETTER Skew-Frobenius Maps on Hyperelliptic Curves

LETTER Skew-Frobenius Maps on Hyperelliptic Curves 189 Skew-Frobenus Maps on Hyperellptc Curves Shunj KOZAKI a, Nonmember, Kazuto MATSUO, Member, and Yasutomo SHIMBARA, Nonmember SUMMARY Scalar multplcaton methods usng the Frobenus maps are known for effcent

More information

Lecture 4: Universal Hash Functions/Streaming Cont d

Lecture 4: Universal Hash Functions/Streaming Cont d CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected

More information

Existence of Two Conjugate Classes of A 5 within S 6. by Use of Character Table of S 6

Existence of Two Conjugate Classes of A 5 within S 6. by Use of Character Table of S 6 Internatonal Mathematcal Forum, Vol. 8, 2013, no. 32, 1591-159 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/mf.2013.3359 Exstence of Two Conjugate Classes of A 5 wthn S by Use of Character Table

More information

An Algorithm for Inversion in GF(2 m ) Suitable for Implementation Using a Polynomial Multiply Instruction on GF(2)

An Algorithm for Inversion in GF(2 m ) Suitable for Implementation Using a Polynomial Multiply Instruction on GF(2) An Algorithm for Inversion in GF2 m Suitable for Implementation Using a Polynomial Multiply Instruction on GF2 Katsuki Kobayashi, Naofumi Takagi, and Kazuyoshi Takagi Department of Information Engineering,

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information

A Parallel Method for the Computation of Matrix Exponential based on Truncated Neumann Series

A Parallel Method for the Computation of Matrix Exponential based on Truncated Neumann Series A Parallel Method for the Computation of Matrix Exponential based on Truncated Neumann Series V. S. Dimitrov 12, V. Ariyarathna 3, D. F. G. Coelho 1, L. Rakai 1, A. Madanayake 3, R. J. Cintra 4 1 ECE Department,

More information

VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES

VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES BÂRZĂ, Slvu Faculty of Mathematcs-Informatcs Spru Haret Unversty barza_slvu@yahoo.com Abstract Ths paper wants to contnue

More information

Formation of Pseudo-Random Sequences of Maximum Period of Transformation of Elliptic Curves

Formation of Pseudo-Random Sequences of Maximum Period of Transformation of Elliptic Curves Internatonal Journal of Computatonal Engneerng Research Vol 03 Issue 5 Formaton of Pseudo-Random Sequences of Maxmum Perod of Transformaton of Ellptc Curves Alexandr Kuznetsov 1 Dmtry Prokopovych-Tkachenko

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Hardening the ElGamal Cryptosystem in the Setting of the Second Group of Units

Hardening the ElGamal Cryptosystem in the Setting of the Second Group of Units 54 The Internatonal Arab Journal of Informaton Technology, Vol., o. 5, September 204 Hardenng the ElGamal Cryptosystem n the Settng of the Second Group of Unts Ramz Haraty, Abdulasser ElKassar, and Suzan

More information