Residue-to-binary conversion for general moduli sets based on approximate Chinese remainder theorem

被引:28
|
作者
Chervyakov, N. I. [1 ]
Molahosseini, A. S. [2 ]
Lyakhov, P. A. [1 ]
Babenko, M. G. [1 ]
Deryabin, M. A. [1 ]
机构
[1] North Caucasian Fed Univ, Dept Appl Math & Math Modelling, Stavropol, Russia
[2] Islamic Azad Univ, Kerman Branch, Dept Comp Engn, Kerman, Iran
关键词
Computer arithmetic; residue number systems; chinese remainder theorem; residue-to-binary converter; residue arithmetic; 65Y04; 65Y05; 65Y20; 65Y10; DESIGN; IMPLEMENTATION; CONVERTER; NUMBERS; ADDERS; POWER;
D O I
10.1080/00207160.2016.1247439
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The residue number system (RNS) is an unconventional number system which can lead to parallel and fault-tolerant arithmetic operations. However, the complexity of residue-to-binary conversion for large number of moduli reduces the overall RNS performance, and makes it inefficient for nowadays high-performance computation systems. In this paper, we present an improved approximate Chinese remainder theorem (CRT) with the aim of performing efficient residue-to-binary conversion for general RNS moduli sets. To achieve this aim, the required number of fraction bits for accurate residue-to-binary conversion is derived. Besides, a method is proposed to substitute fractional calculations by similar computations based on integer numbers to have a hardware amenable algorithm. The proposed approach results in high-speed and low-area residue-to-binary converters for general RNS moduli sets. Therefore, with this conversion method, high dynamic range residue number systems suitable for cryptography and digital signal processing can be designed.
引用
收藏
页码:1833 / 1849
页数:17
相关论文
共 50 条
  • [31] Data Hiding Based on The Chinese Remainder Theorem
    Wang, Chun-Cheng
    Lin, Tsung-Han
    Kuo, Wen-Chung
    International Journal of Network Security, 2021, 23 (06) : 1118 - 1125
  • [32] PDF steganography based on Chinese Remainder Theorem
    Ekodeck, Stephane Gael R.
    Ndoundam, Rene
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 29 : 1 - 15
  • [33] IP Traceback Based on Chinese Remainder Theorem
    Wuu, Lih-Chyau
    Hung, Chi-Hsiang
    Yang, Jyun-Yan
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (06) : 1985 - 1999
  • [34] Ip traceback based on Chinese remainder theorem
    Wuu, Lih-Chyau
    Liu, Tzong-Jye
    Yang, Jyun-Yan
    PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INTERNET, AND INFORMATION TECHNOLOGY, 2007, : 214 - +
  • [35] General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting
    Iftene, Sorin
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 186 (67-84) : 67 - 84
  • [36] The Mixed-Radix Chinese Remainder Theorem and Its Applications to Residue Comparison
    Bi, Shaoqiang
    Gross, Warren J.
    IEEE TRANSACTIONS ON COMPUTERS, 2008, 57 (12) : 1624 - 1632
  • [37] EFFICIENT IMPLEMENTATION OF CHINESE REMAINDER THEOREM IN MINIMALLY REDUNDANT RESIDUE NUMBER SYSTEM
    Selianinau, Mikhail
    COMPUTER SCIENCE-AGH, 2020, 21 (02): : 225 - 240
  • [38] A novel sign detection method in residue number system based on Chinese remainder theorem with fractional values
    Lyakhov, Pavel
    Bergerman, Maxim
    Abdulkadirov, Ruslan
    Abdulsalyamova, Albina
    Nagornov, Nikolay
    Voznesensky, Alexander
    Minenkov, Dmitrii
    Kaplun, Dmitrii
    MICROPROCESSORS AND MICROSYSTEMS, 2023, 102
  • [39] Error Correction in Polynomial Remainder Codes With Non-Pairwise Coprime Moduli and Robust Chinese Remainder Theorem for Polynomials
    Xiao, Li
    Xia, Xiang-Gen
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2015, 63 (03) : 605 - 616
  • [40] CONVOLUTION ALGORITHMS, BASED ON THE CRT (CHINESE REMAINDER THEOREM)
    MARTENS, JB
    SIGNAL PROCESSING, 1984, 6 (04) : 279 - 292