Low-Complexity Multiplier Architectures for Single and Hybrid-Double Multiplications in Gaussian Normal Bases
暂无分享,去创建一个
[1] Kris Gaj,et al. Efficient Linear Array for Multiplication in GF(2m) Using a Normal Basis for Elliptic Curve Cryptography , 2004, CHES.
[2] T. Itoh,et al. A Fast Algorithm for Computing Multiplicative Inverses in GF(2^m) Using Normal Bases , 1988, Inf. Comput..
[3] Arash Reyhani-Masoleh. Efficient algorithms and architectures for field multiplication using Gaussian normal bases , 2006, IEEE Transactions on Computers.
[4] Michele Elia,et al. On the Inherent Space Complexity of Fast Parallel Multipliers for GF(2/supm/) , 2002, IEEE Trans. Computers.
[5] Dieter Gollmann,et al. Algorithm engineering for public key algorithms , 1989, IEEE J. Sel. Areas Commun..
[6] Ted Taekyoung Kwon,et al. Fast Exponentiation Using Split Exponents , 2011, IEEE Transactions on Information Theory.
[7] Majid Ahmadi,et al. A Word-Level Finite Field Multiplier Using Normal Basis , 2011, IEEE Transactions on Computers.
[8] Tim Güneysu,et al. Breaking Elliptic Curve Cryptosystems Using Reconfigurable Hardware , 2010, 2010 International Conference on Field Programmable Logic and Applications.
[9] Dieter Gollmann,et al. Symmetry and Duality in Normal Basis Multiplication , 1988, AAECC.
[10] A. Menezes,et al. Applications of Finite Fields , 1992 .
[11] Gui Liang Feng. A VLSI Architecture for Fast Inversion in GF(2^m) , 1989, IEEE Trans. Computers.
[12] Reza Azarderakhsh,et al. A Modified Low Complexity Digit-Level Gaussian Normal Basis Multiplier , 2010, WAIFI.
[13] Soonhak Kwon,et al. FPGA implementation of high performance elliptic curve cryptographic processor over GF , 2008, J. Syst. Archit..
[14] Dingyi Pei,et al. A VLSI DEsign for Computing Exponentiations in GF(2^m) and Its Application to Generate Pseudorandom Number Sequences , 1990, IEEE Trans. Computers.
[15] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[16] V.K. Bhargava,et al. A Modified Massey-Omura Parallel Multiplier for a Class of Finite Fields , 1993, IEEE Trans. Computers.
[17] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[18] Jagdish Chandra Patra,et al. Concurrent Error Detection in Bit-Serial Normal Basis Multiplication Over ${\rm GF}(2^{m})$ Using Multiple Parity Prediction Schemes , 2010, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[19] M. Anwar Hasan,et al. Efficient digit-serial normal basis multipliers over binary extension fields , 2004, TECS.
[20] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[21] Chiou-Yng Lee,et al. Digit-Serial Gaussian Normal Basis Multiplier over GF(2m) Using Toeplitz Matrix-Approach , 2009, 2009 International Conference on Computational Intelligence and Software Engineering.
[22] Kimmo Järvinen,et al. On Parallelization of High-Speed Processors for Elliptic Curve Cryptography , 2008, IEEE Trans. Very Large Scale Integr. Syst..
[23] Ian F. Blake,et al. Low complexity normal bases , 1989, Discret. Appl. Math..
[24] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[25] Gerald E. Sobelman,et al. Improved VLSI designs for multiplication and inversion in GF(2/sup M/) over normal bases , 2000, Proceedings of 13th Annual IEEE International ASIC/SOC Conference (Cat. No.00TH8541).
[26] Gordon B. Agnew,et al. An implementation for a fast public-key cryptosystem , 2004, Journal of Cryptology.
[27] C. Chiou,et al. Scalable and Systolic Architecture for Computing Double Exponentiation Over GF(2m) , 2006 .
[28] Chiou-Yng Lee. Concurrent error detection architectures for Gaussian normal basis multiplication over GF(2m) , 2010, Integr..
[29] M. Anwar Hasan,et al. A New Construction of Massey-Omura Parallel Multiplier over GF(2m) , 2002, IEEE Trans. Computers.
[30] Berk Sunar,et al. An Efficient Optimal Normal Basis Type II Multiplier , 2001, IEEE Trans. Computers.
[31] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[32] Carl Eklund,et al. National Institute for Standards and Technology , 2009, Encyclopedia of Biometrics.
[33] N. Koblitz. Elliptic curve cryptosystems , 1987 .