10. Conclusion
THOMAS is the first of a family of devices that embody an RSA exponentiation facility for a wide range of applications. The availability of this feature permits the ready incorporation of secure key management in all areas of privacy and high security, with performance as required.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
-W. Diffie, M. Hellman, “New Directions in Cryptography”, I.E.E.E. Trans. Information Theory, vol. IT-22, pp. 644–654, November, 1976.
-R. L. Rivest, A. Shamir, and L. Adleman, “On Digital Signatures and Public Key Cryptosystems”, Communications ACM, vol. 21, pp120–126, February, 1978.
-T. Caron, R. Silverman, “Parallel Implementation of the Quadratic Sieve”, presented at CRYPTO 86, Santa Barbara, CA., August, 1986.
-G. A. Orton, M. P. Roy, P. A. Scott, L. E. Peppard and S. E. Tavares, “VLSI Implementation of Public Key Encryption Algorithms”, presented at CRYPTO 86, Santa Barbara, CA., August 1986.
-M. Kochanski, “Developing an RSA Chip”, presented at CRYPTO 85, Santa Barbara, CA., August 1985.
-R. L. Rivest, “RSA Chips (Past / Present/Future)”, Advances in Cryptology, Proc. of EUROCRYPT 84, pp. 159–165, Springer-Verlag, Berlin, 1985.
-M. P. Roy, S. E. Tavares, and L. E. Peppard, “A CMOS Bit-slice Implementation of the RSA Public Key Encryption Algorithm”, Proc. 1985 Can. Conf. on VLSI, Toronto, Canada, pp. 52–55, November 1985.
-G. Orton, L. E. Peppard and S. E. Tavares, “A Fast Asynchronous RSA Encryption Chip”, I.E.E.E. Custom Integrated Circuits Conference, Rochester, N.Y., May 1986.
-P. A. Scott, S. E. Tavares and L. E. Peppard, “A Fast LSI Multiplier for GF(2**m)”, I.E.E.E. Journal on selected Areas in Communications”, vol. SAC-4, pp. 62–66, January 1986.
-T. Beth, B. M. Cook, D. Gollman, “Architectures for Exponentiation in GF(2**n)”, presented at CRYPTO 86, Santa Barbara, CA., August, 1986.
-D. o. Clayden, “Some Methods of Computing the RSA modular exponential”, NPL Technical Memorandum TTCC 20/85, August 1985.
-P. Barrett, “Communications Authentication and Security using public key encryption”, M.Sc. Dissertation, Programming Research Group, Oxford University, Sept. 1984.
-P. Barrett, “Implementing the RSA Algorithm on a standard Digital Signal Processor (DSP)”, presented at CRYPTO 86, Santa Barbara, CA., August, 1986.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1987 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rankine, G. (1987). Thomas — A Complete Single Chip RSA Device. In: Odlyzko, A.M. (eds) Advances in Cryptology — CRYPTO’ 86. CRYPTO 1986. Lecture Notes in Computer Science, vol 263. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47721-7_36
Download citation
DOI: https://doi.org/10.1007/3-540-47721-7_36
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-18047-0
Online ISBN: 978-3-540-47721-1
eBook Packages: Springer Book Archive