Enhancement security level and hardware implementation of ECDSA
暂无分享,去创建一个
[1] Martin Feldhofer,et al. An ECDSA Processor for RFID Authentication , 2010, RFIDSec.
[2] Ricardo Dahab,et al. Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation , 1999, CHES.
[3] Klaus D. Müller-Glaser,et al. Prime Field ECDSA Signature Processing for Reconfigurable Embedded Systems , 2011, Int. J. Reconfigurable Comput..
[4] Quynh H. Dang,et al. Secure Hash Standard | NIST , 2015 .
[5] William M. Daley,et al. Digital Signature Standard (DSS) , 2000 .
[6] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[7] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[8] Elaine B. Barker,et al. Recommendation for key management: , 2019 .
[9] Vincent Rijmen,et al. ECRYPT yearly report on algorithms and keysizes , 2009 .
[10] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[11] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[12] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[13] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[14] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[15] R. Shanmugalakshmi,et al. Research Issues on Elliptic Curve Cryptography and Its applications , 2009 .
[16] Elaine B. Barker. Digital Signature Standard (DSS) [includes Change Notice 1 from 12/30/1996] | NIST , 1994 .
[17] Mehari Hadis. Cryptoprocessor for Elliptic Curve Digital Signature Algorithm using FPGA , 2013 .
[18] Sarang Aravamuthan,et al. A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks , 2007, 2007 2nd International Conference on Communication Systems Software and Middleware.