A Novel Cryptoprocessor Architecture for the McEliece Public-Key Cryptosystem
暂无分享,去创建一个
Abdulhadi Shoufan | Sorin A. Huss | H. Gregor Molter | Thorsten Wink | Eike Kohnert | S. Huss | A. Shoufan | H. G. Molter | T. Wink | Eike Kohnert | Thorsten Wink
[1] Johannes Buchmann,et al. Introduction to Cryptography (Undergraduate Texts in Mathematics) , 2004 .
[2] Tim Güneysu,et al. MicroEliece: McEliece for Embedded Devices , 2009, CHES.
[3] Mohamed El-Hadedy,et al. High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms , 2008, 2008 International Conference on Reconfigurable Computing and FPGAs.
[4] Sorin A. Huss,et al. A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2n) , 2002, CHES.
[5] Arnaud Tisserand,et al. FPGA Implementation of a Recently Published Signature Scheme , 2004 .
[6] A. K. Lenstra,et al. Factoring polynomials with rational coefficients , 1982 .
[7] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[8] M. McLoone,et al. Hardware Elliptic Curve Cryptographic Processor Over , 2006 .
[9] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[10] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[11] Nicholas J. Patterson,et al. The algebraic decoding of Goppa codes , 1975, IEEE Trans. Inf. Theory.
[12] Abdulhadi Shoufan,et al. A Novel Rekeying Message Authentication Procedure Based on Winternitz OTS and Reconfigurable Hardware Architectures , 2008, 2008 International Conference on Reconfigurable Computing and FPGAs.
[13] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[14] N. Shaikh-Husin,et al. FPGA implementation of RSA public-key cryptographic coprocessor , 2000, 2000 TENCON Proceedings. Intelligent Systems and Technologies for the New Millennium (Cat. No.00CH37119).
[15] Patrice Quinton,et al. Systolic Gaussian Elimination over GF(p) with Partial Pivoting , 1989, IEEE Trans. Computers.
[16] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[17] Shu Lin,et al. Error control coding : fundamentals and applications , 1983 .
[18] Raphael Overbeck,et al. A Summary of McEliece-Type Cryptosystems and their Security , 2007, J. Math. Cryptol..
[19] Kazukuni Kobara,et al. Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC , 2001, Public Key Cryptography.
[20] Francisco Rodríguez-Henríquez,et al. Cryptographic Algorithms on Reconfigurable Hardware , 2010 .
[21] Whitfield Diffie,et al. Analysis of a Public Key Approach Based on Polynomial Substitution , 1985, CRYPTO.
[22] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[23] Andrey Bogdanov,et al. Fast multivariate signature generation in hardware: The case of rainbow , 2008, 2008 International Conference on Application-Specific Systems, Architectures and Processors.
[24] Tanja Lange,et al. Attacking and defending the McEliece cryptosystem , 2008, IACR Cryptol. ePrint Arch..