Abstract
In this paper, we simply present a memory reused multiplication implementation. This scheme could efficiently reduce the number of computations for cryptography system or other computation algorithms.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Rhee, M.Y.: Cryptography and Secure Communications. McGraw-hill book Co., New York (1994)
Feistel, H.: Cryptography and Computer Privacy, vol. 228, pp. 15–23. scientific American (1973)
Feistel, H.: Some Cryptographic Techniques for Machine-to-Machine Data Communications. Proceeding of the IEEE 63, 1545–1554 (1975)
Stallings, W.: Cryptography and Network Security. Pearson Education, Inc., U.S (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hwang, G.Y., Hou, J., Chun, K.H., Lee, M.H. (2005). Memory Reused Multiplication Implementation for Cryptography System. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3481. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424826_79
Download citation
DOI: https://doi.org/10.1007/11424826_79
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25861-2
Online ISBN: 978-3-540-32044-9
eBook Packages: Computer ScienceComputer Science (R0)