Combining Algorithm Exploration with Instruction Set Design: A Case Study in Elliptic Curve Cryptography
暂无分享,去创建一个
Paolo Ienne | Johann Großschädl | Laura Pozzi | Ajay K. Verma | Stefan Tillich | P. Ienne | L. Pozzi | A. K. Verma | S. Tillich | J. Großschädl
[1] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[2] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[3] Scott A. Mahlke,et al. Processor Acceleration Through Automated Instruction Set Customization , 2003, MICRO.
[4] Paolo Ienne,et al. Automatic application-specific instruction-set extensions under microarchitectural constraints , 2003, Proceedings 2003. Design Automation Conference (IEEE Cat. No.03CH37451).
[5] ÇETIN K. KOÇ,et al. Montgomery Multiplication in GF(2k) , 1998, Des. Codes Cryptogr..
[6] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[7] William F. Bond. 64-bit architecture speeds RSA by 4x , 2002 .
[8] Paul G. Comba,et al. Exponentiation Cryptosystems on the IBM PC , 1990, IBM Syst. J..
[9] Harald Niederreiter,et al. Introduction to finite fields and their applications: List of Symbols , 1986 .
[10] Johann Großschädl,et al. Optimized RISC Architecture for Multiple-Precision Modular Arithmetic , 2003, SPC.
[11] Johann Großschädl,et al. Instruction set extension for fast elliptic curve cryptography over binary finite fields GF(2/sup m/) , 2003, Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors. ASAP 2003.
[12] Paolo Ienne,et al. Exact and approximate algorithms for the extension of embedded processor instruction sets , 2006, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[13] Todd M. Austin,et al. The SimpleScalar tool set, version 2.0 , 1997, CARN.
[14] Geoffrey Brown,et al. Lx: a technology platform for customizable VLIW embedded processing , 2000, ISCA '00.