High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor
暂无分享,去创建一个
Çetin Kaya Koç | Murat Aydos | Tugrul Yanik | Ç. Koç | M. Aydos | T. Yanik | Tugrul Yanik
[1] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[2] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[3] Li-Fung Chang,et al. Privacy and authentication on a portable communications system , 1991, IEEE Global Telecommunications Conference GLOBECOM '91: Countdown to the New Millennium. Conference Record.
[4] Yacov Yacobi,et al. Privacy and Authentication on a Portable Communications System , 1993, IEEE J. Sel. Areas Commun..
[5] Tolga Acar,et al. Analyzing and comparing Montgomery multiplication algorithms , 1996, IEEE Micro.
[6] Simon Segars. ARM7TDMI power consumption , 1997, IEEE Micro.
[7] Dave Jaggar,et al. Arm Architecture And Systems , 1997, IEEE Micro.
[8] Alfred Menezes,et al. Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.
[9] Atsuko Miyaji,et al. Efficient Elliptic Curve Exponentiation Using Mixed Coordinates , 1998, ASIACRYPT.
[10] Gary K. Yeap. Architecture and System , 1998 .
[11] Mitsuru Matsui,et al. A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer , 1998, Public Key Cryptography.
[12] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[13] Kouichi Itoh,et al. Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201 , 1999, CHES.
[14] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.