Cotents: 1. Introduction 2. Background information 3. Modified montgomery modular multiplication and RSA exponentiation techniques 4. Montgomery multiplier architectures for public-key cryptosystems-camparisons and analysis 5. An improved montgomery modular inverse algorithm 6. An elliptic curve cryptographic accelerator over GF(p) 7. Public key cryptography for wireless sensor networ…