


Welcome to Hardware Implementation of FiniteField Arithmetic Web site.In this page you can find VHDL codes and other relevant information related with this book. The book is published by McGraw Hill, March 2009. ISBN: 9780071545815
Short description
(Preface of Book)
Finite fields are used in different types of
computers and digital communication systems. Two wellknown examples are
errorcorrection codes and cryptography. The traditional way of
implementing the corresponding algorithms is software, running on
generalpurpose processors or on digitalsignal processors.
Nevertheless, in some cases the time constraints cannot be met with
instructionset processors, and specific hardware must be considered,
that is, circuits specifically designed for executing those complex
algorithms: they implement the particular computation primitives of the
algorithms and take profit of their inherent parallelism. The emphasis is
different from the classic texts on finite fields. It is not limited to
the description of algebraic and algorithmic aspects. The main topic is
circuit synthesis. The book is
divided in 10 chapters. The first chapter (mathematical background)
gives the main definitions and properties of finite fields. Chapters 2
to 4 are dedicated to the operations modulo m and to the
corresponding circuits: Chapter 2 deals with the modulo m reduction,
Chapter 3 with the modulo m addition, subtraction,
multiplication, and exponentiation, and Chapter 4 with the modulo p
division, being p a prime. Chapters 5 and 6 are dedicated to the
operations modulo f(x), being f(x) a polynomial over a finite field, and
to the corresponding circuits: Chapter 5 deals with the modulo f(x)
addition, subtraction, multiplication, and exponentiation, and Chap.ter
6 with the modulo f(x) division, being f(x) an irreducible polynomial.
Chapters 7 to 9 are dedicated to the main arithmetic operations over
GF(2m): in Chap.ter 7 polynomial bases are considered (thus, a
particular case of the topics dealt with in Chapters. 5 and 6); in
Chap.ter 8 normal bases are used, and in Chap.ter 9 dual and triangular
bases are considered. The last (tenth) chapter is dedicated to
ellipticcurve cryptography, currently one of the main finitefield
applications.
The table of contents is also here. This site is under construction apologize us for errors and mistakes

This site was last updated 11/01/08