High-speed Algorithms for Public-key Cryptosystems in an e-Commerce Environment
暂无分享,去创建一个
[1] Anatolij A. Karatsuba,et al. Multiplication of Multidigit Numbers on Automata , 1963 .
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[4] Arnold Schönhage,et al. A Lower Bound for the Length of Addition Chains , 1975, Theor. Comput. Sci..
[5] Ç. Koç. Analysis of sliding window techniques for exponentiation , 1995 .
[6] Paul Barrett,et al. Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor , 1986, CRYPTO.
[7] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[8] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[9] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[10] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[11] Paul G. Comba,et al. Exponentiation Cryptosystems on the IBM PC , 1990, IBM Syst. J..
[12] Burton S. Kaliski,et al. A Cryptographic Library for the Motorola DSP56000 , 1991, EUROCRYPT.