Architectural support for fast symmetric-key cryptography
暂无分享,去创建一个
[1] Cheng-Wen Wu,et al. An improved Montgomery's algorithm for high-speed RSA public-key cryptosystem , 1999, IEEE Trans. Very Large Scale Integr. Syst..
[2] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[3] Xuejia Lai,et al. On the design and security of block ciphers , 1992 .
[4] Wei-Chang Tsai,et al. Two systolic architectures for modular multiplication , 2000, IEEE Trans. Very Large Scale Integr. Syst..
[5] Thomas Blum,et al. Montgomery modular exponentiation on reconfigurable hardware , 1999, Proceedings 14th IEEE Symposium on Computer Arithmetic (Cat. No.99CB36336).
[6] Martin F. Arlitt,et al. Web server workload characterization: the search for invariants , 1996, SIGMETRICS '96.
[7] Ronald M. Smith,et al. ESA/390 Integrated Cryptographic Facility: An Overview , 1991, IBM Syst. J..
[8] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[9] Mikko H. Lipasti,et al. Exceeding the dataflow limit via value prediction , 1996, Proceedings of the 29th Annual IEEE/ACM International Symposium on Microarchitecture. MICRO 29.
[10] Cheng-Wen Wu,et al. Radix-4 modular multiplication and exponentiation algorithms for the RSA public-key cryptosystem , 2000, Proceedings 2000. Design Automation Conference. (IEEE Cat. No.00CH37106).
[11] Charles Cresson Wood,et al. Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50 , 1985, Computers & security.
[12] Perry B. Gentry. What is a VPN? , 2001, Inf. Secur. Tech. Rep..
[13] David A. Patterson,et al. Computer Architecture: A Quantitative Approach , 1969 .
[14] Todd M. Austin,et al. The SimpleScalar tool set, version 2.0 , 1997, CARN.
[15] Ruby B. Lee,et al. Bit permutation instructions for accelerating software cryptography , 2000, Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors.
[16] Donald W. Davies,et al. Security for computer networks - an introduction to data security in teleprocessing and electronic funds transfer (2. ed.) , 1989, Wiley series in communication and distributed systems.
[17] Ronald M. Smith,et al. S/390 CMOS Cryptographic Coprocessor Architecture: Overview and design considerations , 1999, IBM J. Res. Dev..