An Adaptable And Scalable Asymmetric Cryptographic Processor
暂无分享,去创建一个
[1] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[2] Burton S. Kaliski,et al. The Montgomery Inverse and Its Applications , 1995, IEEE Trans. Computers.
[3] M. McLoone,et al. Reconfigurable processor for public-key cryptography , 2005, IEEE Workshop on Signal Processing Systems Design and Implementation, 2005..
[4] Çetin Kaya Koç,et al. A Scalable Architecture for Modular Multiplication Based on Montgomery's Algorithm , 2003, IEEE Trans. Computers.
[5] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[6] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[7] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[8] Sang-Geun Oh,et al. Design and implementation of scalable low-power Montgomery multiplier , 2004, IEEE International Conference on Computer Design: VLSI in Computers and Processors, 2004. ICCD 2004. Proceedings..
[9] Anantha Chandrakasan,et al. An Energy Efficient Reconfigurable Public-Key Cryptograhpy Processor Architecture , 2000, CHES.
[10] Paul Barrett,et al. Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor , 1986, CRYPTO.
[11] Wolfgang Bauer. Implementing elliptic curve cryptography , 2002, Communications and Multimedia Security.
[12] Tibor Juhas. The use of elliptic curves in cryptography , 2007 .
[13] Donald E. Knuth,et al. The art of computer programming. Vol.2: Seminumerical algorithms , 1981 .
[14] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[15] Akashi Satoh,et al. A Scalable Dual-Field Elliptic Curve Cryptographic Processor , 2003, IEEE Trans. Computers.