Modular Reduction in GF(2n) without Pre-computational Phase
暂无分享,去创建一个
Ingrid Verbauwhede | Kazuo Sakiyama | Junfeng Fan | Miroslav Knezevic | I. Verbauwhede | Miroslav Knezevic | Junfeng Fan | K. Sakiyama
[1] Paul Barrett,et al. Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor , 1986, CRYPTO.
[2] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[5] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[6] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[7] Jean-François Dhem. Efficient Modular Reduction Algorithm in IFq[x] and Its Application to "Left to Right" Modular Multiplication in IF2[x] , 2003, CHES.
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[9] ÇETIN K. KOÇ,et al. Montgomery Multiplication in GF(2k) , 1998, Des. Codes Cryptogr..
[10] Haibin Shen,et al. Unbalanced Exponent Modular Reduction over Binary Field and Its Implementation , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).
[11] N. Koblitz. Elliptic curve cryptosystems , 1987 .