Parallel RSA encryption based on tree architecture
暂无分享,去创建一个
[1] Nadia Nedjah,et al. M-ary parallel modular exponentiation: Software vs. hardware , 2010, 2010 15th CSI International Symposium on Computer Architecture and Digital Systems.
[2] David Taniar,et al. Parallel algorithms for selection query processing involving index in parallel database systems , 2004, Comput. Syst. Sci. Eng..
[3] Manfred Glesner,et al. Design of a reconfigurable AES encryption/decryption engine for mobile terminals , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[4] Tom Chen,et al. Design and implementation , 2006, IEEE Commun. Mag..
[5] A. Jalali,et al. An Improved Exponentiation Algorithm for RSA Cryptosystem , 2009, 2009 International Conference on Research Challenges in Computer Science.
[6] Thongpon Teerakanok,et al. Accelerating asymmetric-key cryptography using Parallel-key Cryptographic Algorithm (PCA) , 2009, 2009 6th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology.
[7] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[8] Ammar Belatreche,et al. Fast architectures for FPGA-based implementation of RSA encryption algorithm , 2004, Proceedings. 2004 IEEE International Conference on Field- Programmable Technology (IEEE Cat. No.04EX921).
[9] Adam J. Elbirt. Understanding and Applying Cryptography and Data Security , 2009 .
[10] Eric Peeters,et al. Parallel FPGA implementation of RSA with residue number systems - can side-channel threats be avoided? , 2003, 2003 46th Midwest Symposium on Circuits and Systems.
[11] Xudong Chen,et al. Parallelization of RSA Algorithm Based on Compute Unified Device Architecture , 2010, 2010 Ninth International Conference on Grid and Cloud Computing.
[12] Yu-Hao Chang,et al. A Study on Parallel RSA Factorization , 2009, J. Comput..
[13] Dan Boneh,et al. TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .
[14] Qing Liu,et al. Design and implementation of an improved RSA algorithm , 2010, 2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT).
[15] A. R. Ramli,et al. Implementation and evaluation of new cryptography algorithm for e-mail applications , 2009 .
[16] Debasis Das,et al. A Parallel Encryption Algorithm for Block Ciphers Based on Reversible Programmable Cellular Automata , 2010, ArXiv.
[17] Qiang Liu,et al. A regular parallel RSA processor , 2004, The 2004 47th Midwest Symposium on Circuits and Systems, 2004. MWSCAS '04..
[18] Poonsri Vate-U-Lan. An Invitation Method Enhance Internet-Based Survey Response Rates , 2006 .
[19] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[20] Nigel P. Smart,et al. Cryptography: An Introduction , 2004 .
[21] N. Shaikh-Husin,et al. FPGA implementation of RSA public-key cryptographic coprocessor , 2000, 2000 TENCON Proceedings. Intelligent Systems and Technologies for the New Millennium (Cat. No.00CH37119).
[22] John Viega,et al. Network Security with OpenSSL , 2002 .
[23] Jilin Zhang,et al. OpenMP compiler for distributed memory architectures , 2010, Science China Information Sciences.
[24] Ding Nan,et al. The Parallelization Design of Chaotic Encryption System Based on Mulit-level Shuffle-Exchange Network , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[25] Dragos Trinca,et al. Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).
[26] Ali Ziya Alkar,et al. A hardware version of the RSA using the Montgomery's algorithm with systolic arrays , 2004, Integr..
[27] Akira Hayashi,et al. A new fast modular multiplication method and its application to modular exponentiation‐based cryptography , 2000 .
[28] Abdul Rahman Ramli,et al. A parallel XTS encryption mode of operation , 2009, 2009 IEEE Student Conference on Research and Development (SCOReD).
[29] Simon W. Moore,et al. Hardware-Software Codesign of a Vector Co-processor for Public Key Cryptography , 2006, 9th EUROMICRO Conference on Digital System Design (DSD'06).
[30] A. Samsudin,et al. Current State of Sequential Cryptography and Its Future Direction in Parallel System , 2008, 2008 International Symposium on High Capacity Optical Networks and Enabling Technologies.
[31] Chia-Long Wu,et al. Fast Parallel Montgomery Binary Exponentiation Algorithm Using Canonical- Signed-Digit Recoding Technique , 2009, ICA3PP.
[32] Nitin Rakesh,et al. k-k sorting on the Multi Mesh of Trees , 2010, 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE).
[33] Himanshu Thapliyal,et al. VLSI implementation of RSA encryption system using ancient Indian Vedic mathematics , 2005, SPIE Microtechnologies.
[34] Ling Feng,et al. Preparations for encrypted XML metadata querying , 2004, Comput. Syst. Sci. Eng..
[35] Qing Liu,et al. On the design and implementation of an efficient RSA variant , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[36] Wlodzimierz Bielecki,et al. Parallelization Method of Encryption Algorithms , 2007, Advances in Information Processing and Protection.
[37] David Pointcheval,et al. Parallel authentication and public-key encryption , 2003 .
[38] Hung-Yu Chien. Extending RSA cryptosystems to proxy multi‐signature scheme allowing parallel individual signing operation , 2006 .
[39] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .