Abstract
We propose two hardware inverters for calculating the multiplicative inverses in finite fields GF(2m): one produces a result in every O(m) time using O(m) area; and the other produces a result in every O(1) time using O(m2) area. While existing O(m)-time inverters require at least two shift registers in the datapath, the proposed O(m)-time implementation uses onlyon e, thus costing less hardware. By exploiting the idea used in the O(m)-time inverter and developing a new wayof controlling the dataflow, we also design a new O(1)-time inverter that works faster but costs less hardware than the best previouslypro posed O(1)-time implementation with the same area-time complexity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Koblitz, N.: A course in number theoryan d cryptography. 2nd ed. Springer-Verlag New York, Inc. (1994) 313
Paar, C., Rosner, M.: Comparison of arithmetic architectures for Reed-Solomon decoders in reconfigurable hardware. Proc. IEEE FCCM’97 (1997) 219–225 313
Brunner H., Curiger, A., Hofstetter, M.: On Computing Multiplicative Inverses in GF(2m). IEEE Trans. Comput. 42(8) (1993) 1010–1015 313, 314, 320
Hasan, M.A.: Efficient computation of multiplicative inverses for cryptographic applications. Proc. IEEE ARITH-15 (2001) 66–72 313, 314, 315, 319, 320, 324
Guo, J.-H., Wang, C.-L.: Systolic Array Implementation of Euclid’s Algorithm for Inversion and Division in GF(2m). IEEE Trans. Comput. 47(10) (1998) 1161–1167 313, 314, 315, 320, 324, 325
Synopsys, Version 2000.11. Synopsys Inc., Mountain View, CA, (2000) 314
National Institute of Standards and Technology: Digital signature standard. FIPS Publication 186–2 (2000) 319
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, HG., Oh, HC. (2003). Efficient Hardware Multiplicative Inverters. In: Lee, P.J., Lim, C.H. (eds) Information Security and Cryptology — ICISC 2002. ICISC 2002. Lecture Notes in Computer Science, vol 2587. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36552-4_22
Download citation
DOI: https://doi.org/10.1007/3-540-36552-4_22
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00716-6
Online ISBN: 978-3-540-36552-5
eBook Packages: Springer Book Archive