• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Fan Yibo, Zeng Xiaoyang, and Yu Yu. VLSI Design of a High-Speed RSA Crypto-Coprocessor with Reconfigurable Architecture[J]. Journal of Computer Research and Development, 2006, 43(6): 1076-1082.
Citation: Fan Yibo, Zeng Xiaoyang, and Yu Yu. VLSI Design of a High-Speed RSA Crypto-Coprocessor with Reconfigurable Architecture[J]. Journal of Computer Research and Development, 2006, 43(6): 1076-1082.

VLSI Design of a High-Speed RSA Crypto-Coprocessor with Reconfigurable Architecture

More Information
  • Published Date: June 14, 2006
  • Through analyzing and comparing the normal RSA algorithm to the modified modular exponentiation and Montgomery multiplication algorithm in the arithmetic level, a nested pipelined RSA crypto-processor architecture is presented. This architecture has high-speed and reconfigurable feature. Based on the architecture, an RSA crypto-processor with various speed & key size can be designed, and it is especially valuable for high speed, long key size applications. It is also suitable for low speed, long key size, and high security level applications, or configured as an IP core embedded in SoC platform. As an example, a high-speed 1024-bit RSA crypto-processor is implemented using 0.18μm CMOS technology. The simulation result indicates that the encryption rate of the crypto-processor is more than 5000 times per second at 150MHz clock frequency. The performance of the crypto-processor proposed is the best reported in the literature in China.
  • Related Articles

    [1]Gao Guangyong, Ji Chi, Xia Zhihua. Reversible Data Hiding in Color Encrypted Images Based on Color Channels Correlation and Entropy Coding[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202330880
    [2]Guan Xiaoqiang, Wang Wenjian, Pang Jifang, Meng Yinfeng. Space Transformation Based Random Forest Algorithm[J]. Journal of Computer Research and Development, 2021, 58(11): 2485-2499. DOI: 10.7544/issn1000-1239.2021.20200523
    [3]Tian Ye, Xiang Shijun. LBP and Multilayer DCT Based Anti-Spoofing Countermeasure in Face Liveness Detection[J]. Journal of Computer Research and Development, 2018, 55(3): 643-650. DOI: 10.7544/issn1000-1239.2018.20160417
    [4]Liu Shenglan, Feng Lin, Jin Bo, Wu Zhenyu. A New Local Space Alignment Algorithm[J]. Journal of Computer Research and Development, 2013, 50(7): 1426-1434.
    [5]Xiong Gangqiang, Yu Jiande, Xiong Changzhen, Qi Dongxu. Reversible Factorization of U Orthogonal Transform and Image Lossless Coding[J]. Journal of Computer Research and Development, 2012, 49(4): 856-863.
    [6]Zhang Hongyi, Zhang Junying, Zhao Feng. Extraction of Discriminant Features Based on Optimal Transformation and Cluster Centers of Kernel Space[J]. Journal of Computer Research and Development, 2008, 45(12): 2138-2144.
    [7]Chen Yunjie, Zhang Jianwei, Wei Zhihui, Heng Pheng Ann, Xia Deshen. Automatic Chinese Visual Human Image Segmentation in HSV Space[J]. Journal of Computer Research and Development, 2007, 44(12): 2036-2043.
    [8]Wang Huanbao, Zhang Yousheng, and Li Yuan. A Diagram of Strand Spaces for Security Protocols[J]. Journal of Computer Research and Development, 2006, 43(12): 2062-2068.
    [9]Liu Bing, Yan Heping, Duan Jiangjiao, Wang Wei, and Shi Baile. A Bottom-Up Distance-Based Index Tree for Metric Space[J]. Journal of Computer Research and Development, 2006, 43(9): 1651-1657.
    [10]Zhan Yongzhao, Wang Jinfeng, and Mao Qirong. Nested Knowledge Space Model and Awareness Processing in a Collaborative Learning Environment[J]. Journal of Computer Research and Development, 2005, 42(7): 1159-1165.

Catalog

    Article views (933) PDF downloads (491) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return