Long Modular Multiplication for Cryptographic Applications
暂无分享,去创建一个
[1] David Thomas,et al. The Art in Computer Programming , 2001 .
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] Donald E. Knuth,et al. The art of computer programming. Vol.2: Seminumerical algorithms , 1981 .
[4] C. Mitchell,et al. Minimum weight modified signed-digit representations and fast exponentiation , 1989 .
[5] Colin D. Walter. Faster Modular Multiplication by Operand Scaling , 1991, CRYPTO.
[6] Jean-Jacques Quisquater,et al. Recent Results on Modular Multiplications for Smart Cards , 1998, CARDIS.
[7] Ernest A. Brickell. A survey of hardware implementations of RSA (abstract) , 1989, CRYPTO 1989.
[8] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[9] Joos Vandewalle,et al. Comparison of Three Modular Reduction Functions , 1993, CRYPTO.
[10] Paul Barrett,et al. Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor , 1986, CRYPTO.
[11] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[12] Jeremy R. Johnson,et al. Efficient multiprecision floating point multiplication with optimal directional rounding , 1993, Proceedings of IEEE 11th Symposium on Computer Arithmetic.
[13] P. L. Montgomery. Modular multiplication without trial division , 1985 .