A Vector Approach to Cryptography Implementation
暂无分享,去创建一个
[1] Çetin Kaya Koç,et al. A Scalable Architecture for Montgomery Multiplication , 1999, CHES.
[2] Richard M. Russell,et al. The CRAY-1 computer system , 1978, CACM.
[3] David A. Patterson,et al. Computer Architecture: A Quantitative Approach , 1969 .
[4] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[5] Nigel P. Smart,et al. Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series) , 2005 .
[6] ÇETIN K. KOÇ,et al. Montgomery Multiplication in GF(2k) , 1998, Des. Codes Cryptogr..
[7] Antonio González,et al. Energy-effective issue logic , 2001, ISCA 2001.
[8] Christophe Clavier,et al. Optimal Statistical Power Analysis , 2003, IACR Cryptol. ePrint Arch..
[9] John Wawrzynek,et al. Vector microprocessors , 1998 .
[10] Ruby B. Lee,et al. Architectural techniques for accelerating subword permutations with repetitions , 2003, IEEE Trans. Very Large Scale Integr. Syst..
[11] Johann Großschädl,et al. Instruction set extension for fast elliptic curve cryptography over binary finite fields GF(2/sup m/) , 2003, Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors. ASAP 2003.
[12] Henk Corporaal. Microprocessor architectures - from VLIW to TTA , 1997 .
[13] Nathalie Feyt,et al. Hardware and Software Symbiosis Helps Smart Card Evolution , 2001, IEEE Micro.
[14] Alok N. Choudhary,et al. Flexible software protection using hardware/software codesign techniques , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.
[15] Christophe Giraud,et al. An Implementation of DES and AES, Secure against Some Attacks , 2001, CHES.
[16] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[17] David Naccache,et al. Cryptographic Hardware and Embedded Systems — CHES 2001 , 2001 .