Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2018, Article ID 4983404, 18 pages
Research Article

A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF() Based on Montgomery Arithmetic

1Department of Electronic and Computer Engineering, University of Limerick, Limerick, Ireland
2Institute ProtectIT, Deggendorf Institute of Technology, 94469 Deggendorf, Germany

Correspondence should be addressed to Martin Schramm; ed.ged-ht@mmarhcs.nitram

Received 6 October 2017; Revised 14 March 2018; Accepted 17 May 2018; Published 21 June 2018

Academic Editor: Fawad Ahmed

Copyright © 2018 Martin Schramm et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [2 citations]

The following is the list of published articles that have cited the current article.

  • Hojoong Park, Yongjin Yeom, and Ju-Sung Kang, “A Lightweight BCH Code Corrector of TRNG with Measurable Dependence,” Security and Communication Networks, vol. 2019, pp. 1–11, 2019. View at Publisher · View at Google Scholar
  • Titus N. Balan, Alexandra C. Balan, and Florin D. Sandu, “SDR implementation of a D2D security cryptographic mechanism,” IEEE Access, pp. 1–1, 2019. View at Publisher · View at Google Scholar