Novel Methods for Montgomery Modular Multiplication for Public Key Cryptosystems
暂无分享,去创建一个
[1] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[2] David M'Raïhi,et al. Can Montgomery parasites be avoided? A design methodology based on key and cryptosystem modifications , 1995, Des. Codes Cryptogr..
[3] Walter M. Lioen,et al. Factorization of RSA-140 Using the Number Field Sieve , 1999, CRYPTO 1999.
[4] Shimon Even. Systolic Modular Multiplication , 1990, CRYPTO.
[5] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[6] ÇETIN K. KOÇ,et al. Montgomery Multiplication in GF(2k) , 1998, Des. Codes Cryptogr..
[7] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[8] Aggelos Kiayias,et al. BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..
[9] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[10] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[11] Tolga Acar,et al. Analyzing and comparing Montgomery multiplication algorithms , 1996, IEEE Micro.
[12] Donald E. Knuth,et al. The art of computer programming. Vol.2: Seminumerical algorithms , 1981 .
[13] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[14] Christof Paar,et al. Efficient Algorithms for Elliptic Curve Cryptosystems , 1997, CRYPTO.
[15] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[16] Jiang Zhang,et al. Fast Algorithms for Elliptic Curve Cryptosystems over Binary Finite Field , 1999, ASIACRYPT.