Residue-to-binary conversion for general moduli sets based on approximate Chinese remainder theorem

被引:28
|
作者
Chervyakov, N. I. [1 ]
Molahosseini, A. S. [2 ]
Lyakhov, P. A. [1 ]
Babenko, M. G. [1 ]
Deryabin, M. A. [1 ]
机构
[1] North Caucasian Fed Univ, Dept Appl Math & Math Modelling, Stavropol, Russia
[2] Islamic Azad Univ, Kerman Branch, Dept Comp Engn, Kerman, Iran
关键词
Computer arithmetic; residue number systems; chinese remainder theorem; residue-to-binary converter; residue arithmetic; 65Y04; 65Y05; 65Y20; 65Y10; DESIGN; IMPLEMENTATION; CONVERTER; NUMBERS; ADDERS; POWER;
D O I
10.1080/00207160.2016.1247439
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The residue number system (RNS) is an unconventional number system which can lead to parallel and fault-tolerant arithmetic operations. However, the complexity of residue-to-binary conversion for large number of moduli reduces the overall RNS performance, and makes it inefficient for nowadays high-performance computation systems. In this paper, we present an improved approximate Chinese remainder theorem (CRT) with the aim of performing efficient residue-to-binary conversion for general RNS moduli sets. To achieve this aim, the required number of fraction bits for accurate residue-to-binary conversion is derived. Besides, a method is proposed to substitute fractional calculations by similar computations based on integer numbers to have a hardware amenable algorithm. The proposed approach results in high-speed and low-area residue-to-binary converters for general RNS moduli sets. Therefore, with this conversion method, high dynamic range residue number systems suitable for cryptography and digital signal processing can be designed.
引用
收藏
页码:1833 / 1849
页数:17
相关论文
共 50 条
  • [41] Families of traceability codes based on the Chinese Remainder Theorem
    Cotrina, Josep
    Fernandez, Marcel
    Casademont, Jordi
    2006 IEEE INFORMATION THEORY WORKSHOP, 2006, : 121 - +
  • [42] Weighted secret sharing based on the chinese remainder theorem
    Harn, Lein
    Fuyou, Miao
    International Journal of Network Security, 2014, 16 (06) : 420 - 426
  • [43] Quantum anonymous ranking based on the Chinese remainder theorem
    Lin, Song
    Guo, Gong-De
    Huang, Feng
    Liu, Xiao-Fen
    PHYSICAL REVIEW A, 2016, 93 (01)
  • [44] An Information Hiding Scheme Based on Chinese Remainder Theorem
    Chen, Jinrui
    Liu, Kesheng
    Yan, Xuehu
    Liu, Hanlin
    Liu, Lintao
    Tan, Longdan
    2018 IEEE 3RD INTERNATIONAL CONFERENCE ON IMAGE, VISION AND COMPUTING (ICIVC), 2018, : 785 - 790
  • [45] Robust threshold schemes based on the Chinese Remainder Theorem
    Kaya, Kamer
    Selcuk, Ali Aydm
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 94 - 108
  • [46] Quantum Secret Sharing Based on Chinese Remainder Theorem
    施荣华
    粟倩
    郭迎
    李门浩
    Communications in Theoretical Physics, 2011, 55 (04) : 573 - 578
  • [47] RSA cryptosystem design based on the Chinese Remainder Theorem
    Wu, CH
    Hong, JH
    Wu, CW
    PROCEEDINGS OF THE ASP-DAC 2001: ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE 2001, 2001, : 391 - 395
  • [48] Digital watermark sharing based on Chinese remainder theorem
    Liu, Jun
    Luo, Shou-Shan
    Wu, Qiu-Xin
    Niu, Xin-Xin
    Yang, Yi-Xian
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2002, 25 (01): : 17 - 21
  • [49] Weighted Threshold RSA Based on the Chinese Remainder Theorem
    Iftene, Sorin
    Grindei, Manuela
    NINTH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING, PROCEEDINGS, 2007, : 175 - 181
  • [50] A Digital Watermarking Algorithm Based on Chinese Remainder Theorem
    Luo, Xiao Feng
    Xu, Qiaozhi
    Zhang, Junxing
    2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,