Time Efficient Dual-Field Unit for Cryptography-Related Processing
暂无分享,去创建一个
[1] Christof Paar,et al. High-Radix Montgomery Modular Exponentiation on Reconfigurable Hardware , 2001, IEEE Trans. Computers.
[2] Akashi Satoh,et al. A Scalable Dual-Field Elliptic Curve Cryptographic Processor , 2003, IEEE Trans. Computers.
[3] Johann Großschädl,et al. Instruction set extension for fast elliptic curve cryptography over binary finite fields GF(2/sup m/) , 2003, Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors. ASAP 2003.
[4] Sang-Geun Oh,et al. Design and implementation of scalable low-power Montgomery multiplier , 2004, IEEE International Conference on Computer Design: VLSI in Computers and Processors, 2004. ICCD 2004. Proceedings..
[5] Johann Großschädl,et al. Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF ( p ) and GF ( 2 m ) , 2003 .
[6] Wei-Chang Tsai,et al. Two systolic architectures for modular multiplication , 2000, IEEE Trans. Very Large Scale Integr. Syst..
[7] Johannes Wolkerstorfer,et al. Dual-Field Arithmetic Unit for GF(p) and GF(2m) , 2002, CHES.
[8] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[9] Tolga Acar,et al. Analyzing and comparing Montgomery multiplication algorithms , 1996, IEEE Micro.
[10] Erkay Savas,et al. A Scalable and Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m) , 2000, CHES.
[11] Johann Großschädl,et al. A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m) , 2001, CHES.
[12] Johann Großschädl,et al. Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2m) , 2003, WISA.
[13] Nigel P. Smart,et al. Elliptic Curves in Cryptography: Preface , 1999 .
[14] Joos Vandewalle,et al. Hardware implementation of a Montgomery modular multiplier in a systolic array , 2003, Proceedings International Parallel and Distributed Processing Symposium.
[15] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[16] N. Burgess. Removal of sign-extension circuitry from Booth's algorithm multiplier-accumulators , 1990 .
[17] ÇETIN K. KOÇ,et al. Montgomery Multiplication in GF(2k) , 1998, Des. Codes Cryptogr..
[18] Lo'ai Ali Tawalbeh,et al. Carry-save representation is shift-unsafe: the problem and its solution , 2006, IEEE Transactions on Computers.
[19] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[20] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[21] David Naccache,et al. Cryptographic Hardware and Embedded Systems — CHES 2001 , 2001 .
[22] Ingrid Verbauwhede,et al. A fast dual-field modular arithmetic logic unit and its hardware implementation , 2006, 2006 IEEE International Symposium on Circuits and Systems.
[23] C. D. Walter,et al. Systolic Modular Multiplication , 1993, IEEE Trans. Computers.