Systematic Design of RSA Processors Based on High-Radix Montgomery Multipliers
暂无分享,去创建一个
[1] Francis M. Crowe,et al. A scalable dual mode arithmetic unit for public key cryptosystems , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[2] M. McLoone,et al. Fast Montgomery modular multiplication and RSA cryptographic processor architectures , 2003, The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, 2003.
[3] Marc Joye,et al. Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis , 2000, IEEE Trans. Computers.
[4] J. Quisquater,et al. Fast decipherment algorithm for RSA public-key cryptosystem , 1982 .
[5] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[6] Thomas Blum,et al. Montgomery modular exponentiation on reconfigurable hardware , 1999, Proceedings 14th IEEE Symposium on Computer Arithmetic (Cat. No.99CB36336).
[7] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[8] William P. Marnane,et al. Efficient architectures for implementing montgomery modular multiplication and RSA modular exponentiation on reconfigurable logic , 2002, FPGA '02.
[9] Sanu Mathew,et al. An improved unified scalable radix-2 Montgomery multiplier , 2005, 17th IEEE Symposium on Computer Arithmetic (ARITH'05).
[10] Marc Joye,et al. The Montgomery Powering Ladder , 2002, CHES.
[11] Frédéric Valette,et al. The Doubling Attack - Why Upwards Is Better than Downwards , 2003, CHES.
[12] Yasuo Takahashi,et al. A multiple-valued logic and memory with combined single-electron and metal-oxide-semiconductor transistors , 2003 .
[13] Christof Paar,et al. High-Radix Montgomery Modular Exponentiation on Reconfigurable Hardware , 2001, IEEE Trans. Computers.
[14] Tolga Acar,et al. Analyzing and comparing Montgomery multiplication algorithms , 1996, IEEE Micro.
[15] Jean-Sébastien Coron,et al. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems , 1999, CHES.
[16] Marc Joye,et al. Highly Regular Right-to-Left Algorithms for Scalar Multiplication , 2007, CHES.
[17] Israel Koren. Computer arithmetic algorithms , 1993 .
[18] Çetin Kaya Koç,et al. A Scalable Architecture for Modular Multiplication Based on Montgomery's Algorithm , 2003, IEEE Trans. Computers.
[19] Erkay Savas,et al. A Scalable and Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m) , 2000, CHES.
[20] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[21] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[22] Behrooz Parhami,et al. Computer arithmetic - algorithms and hardware designs , 1999 .
[23] Akashi Satoh,et al. A Scalable Dual-Field Elliptic Curve Cryptographic Processor , 2003, IEEE Trans. Computers.
[24] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[25] Akashi Satoh,et al. Systematic design of high-radix Montgomery multipliers for RSA processors , 2008, 2008 IEEE International Conference on Computer Design.