Multiplierless Design of High-Speed Very Large Constant Multiplications

09/11/2023
by   Levent Aksoy, et al.
0

In cryptographic algorithms, the constants to be multiplied by a variable can be very large due to security requirements. Thus, the hardware complexity of such algorithms heavily depends on the design architecture handling large constants. In this paper, we introduce an electronic design automation tool, called LEIGER, which can automatically generate the realizations of very large constant multiplications for low-complexity and high-speed applications, targeting the ASIC design platform. LEIGER can utilize the shift-adds architecture and use 3-input operations, i.e., carry-save adders (CSAs), where the number of CSAs is reduced using a prominent optimization algorithm. It can also generate constant multiplications under a hybrid design architecture, where 2-and 3-input operations are used at different stages. Moreover, it can describe constant multiplications under a design architecture using compressor trees. As a case study, high-speed Montgomery multiplication, which is a fundamental operation in cryptographic algorithms, is designed with its constant multiplication block realized under the proposed architectures. Experimental results indicate that LEIGER enables a designer to explore the trade-off between area and delay of the very large constant and Montgomery multiplications and leads to designs with area-delay product, latency, and energy consumption values significantly better than those obtained by a recently proposed algorithm.

READ FULL TEXT

page 1

page 2

page 3

page 4

page 5

research
05/21/2022

Multiplierless Design of Very Large Constant Multiplications in Cryptography

This brief addresses the problem of implementing very large constant mul...
research
08/04/2021

Efficient Hardware Realizations of Feedforward Artificial Neural Networks

This article presents design techniques proposed for efficient hardware ...
research
08/30/2023

High-Speed (7,2) Compressor Using A Fast Carry-Generation Logic based on Sorting Network

Fast binary compressors are the main components of many basic digital ca...
research
05/13/2021

High-level Intellectual Property Obfuscation via Decoy Constants

This paper presents a high-level circuit obfuscation technique to preven...
research
03/25/2016

ASIC-based Implementation of Synchronous Section-Carry Based Carry Lookahead Adders

The section-carry based carry lookahead adder (SCBCLA) topology was prop...
research
11/08/2022

A study and comparison of COordinate Rotation DIgital Computer (CORDIC) architectures

Most of the digital signal processing applications performs operations l...
research
03/03/2023

PaReNTT: Low-Latency Parallel Residue Number System and NTT-Based Long Polynomial Modular Multiplication for Homomorphic Encryption

High-speed long polynomial multiplication is important for applications ...

Please sign up or login with your details

Forgot password? Click here to reset