-
1
-
-
0003315637
-
"Computational Method and Apparatus for Finite Field Arithmetic"
-
J.L. Massey and J.K. Omura, "Computational Method and Apparatus for Finite Field Arithmetic," US Patent No. 4,587,627, 1986.
-
(1986)
US Patent No. 4,587,627
-
-
Massey, J.L.1
Omura, J.K.2
-
2
-
-
0022108239
-
m)"
-
Aug
-
m)," IEEE Trans. Computers, vol. 34, no. 8, pp. 709-716, Aug. 1985.
-
(1985)
IEEE Trans. Computers
, vol.34
, Issue.8
, pp. 709-716
-
-
Wang, C.C.1
Truong, T.K.2
Shao, H.M.3
Deutsch, L.J.4
Omura, J.K.5
Reed, I.S.6
-
3
-
-
0035107422
-
"An Efficient Optimal Normal Basis Type II Multiplier"
-
Jan
-
B. Sunar and Ç.K. Koç "An Efficient Optimal Normal Basis Type II Multiplier," IEEE Trans. Computers, vol. 50, no. 1, pp. 83-88, Jan. 2001.
-
(2001)
IEEE Trans. Computers
, vol.50
, Issue.1
, pp. 83-88
-
-
Sunar, B.1
Koç, Ç.K.2
-
4
-
-
0036566216
-
m)"
-
May
-
m)," IEEE Trans. Computers, vol. 51, no. 5, pp. 511-520, May 2002.
-
(2002)
IEEE Trans. Computers
, vol.51
, Issue.5
, pp. 511-520
-
-
Reyhani-Masoleh, A.1
Hasan, M.A.2
-
5
-
-
0020207091
-
"Bit-Serial Reed-Solomon Encoders"
-
Nov
-
E.R. Berlekamp, "Bit-Serial Reed-Solomon Encoders," IEEE Trans. Information Theory, vol. 28, no. 6, pp. 869-874, Nov. 1982.
-
(1982)
IEEE Trans. Information Theory
, vol.28
, Issue.6
, pp. 869-874
-
-
Berlekamp, E.R.1
-
6
-
-
0025824903
-
"An Implementation for a Fast Public-Key Cryptosystem"
-
G.B. Agnew, R.C. Mullin, I.M. Onyszchuk, and S.A. Vanstone, "An Implementation for a Fast Public-Key Cryptosystem," J. Cryptology vol. 3, pp. 63-79, 1991.
-
(1991)
J. Cryptology
, vol.3
, pp. 63-79
-
-
Agnew, G.B.1
Mullin, R.C.2
Onyszchuk, I.M.3
Vanstone, S.A.4
-
7
-
-
0003393443
-
"VLSI Architectures for Computation in Galois Fields"
-
PhD thesis, Linkoping Univ., Linkoping Sweden
-
E.D. Mastrovito, "VLSI Architectures for Computation in Galois Fields," PhD thesis, Linkoping Univ., Linkoping Sweden, 1991.
-
(1991)
-
-
Mastrovito, E.D.1
-
9
-
-
0003735733
-
"IEEE Standard Specifications for Public-Key Cryptography"
-
IEEE Std 1363-2000, Jan
-
IEEE Std 1363-2000, "IEEE Standard Specifications for Public-Key Cryptography," Jan. 2000.
-
(2000)
-
-
-
10
-
-
45549114790
-
n)"
-
n)," Discrete Applied Math., vol. 22, pp. 149-161, 1988/1989.
-
(1988)
Discrete Applied Math.
, vol.22
, pp. 149-161
-
-
Mullin, R.C.1
Onyszchuk, I.M.2
Vanstone, S.A.3
Wilson, R.M.4
-
12
-
-
85017122508
-
"Efficient Digit-Serial Normal Basis Multipliers over GF(2m)"
-
special issue on embedded systems and security, Aug
-
A. Reyhani-Masoleh and M.A. Hasan, "Efficient Digit-Serial Normal Basis Multipliers over GF(2m)," ACM Trans. Embedded Computing Systems (TECS), special issue on embedded systems and security, vol. 3, no. 3, pp. 575-592, Aug. 2004.
-
(2004)
ACM Trans. Embedded Computing Systems (TECS)
, vol.3
, Issue.3
, pp. 575-592
-
-
Reyhani-Masoleh, A.1
Hasan, M.A.2
-
13
-
-
0038639375
-
"Efficient Multiplication beyond Optimal Normal Bases"
-
special issue on cvryptographic hardware and embedded systems, Apr
-
A. Reyhani-Masoleh and M.A. Hasan, "Efficient Multiplication beyond Optimal Normal Bases," IEEE Trans. Computers, special issue on cvryptographic hardware and embedded systems, vol. 52, no. 4, pp. 428-439, Apr. 2003.
-
(2003)
IEEE Trans. Computers
, vol.52
, Issue.4
, pp. 428-439
-
-
Reyhani-Masoleh, A.1
Hasan, M.A.2
-
14
-
-
0024662452
-
"Algorithm Engineering for Public Key Algorithms"
-
May
-
T. Beth and D. Gollman, "Algorithm Engineering for Public Key Algorithms," IEEE J. Selected Areas in Comm., vol. 7, no. 4, pp. 458-465, May 1989.
-
(1989)
IEEE J. Selected Areas in Comm.
, vol.7
, Issue.4
, pp. 458-465
-
-
Beth, T.1
Gollman, D.2
-
15
-
-
85034752854
-
"Symmetry and Duality in Normal Basis Multiplication"
-
July
-
W. Geiselmann and D. Gollmann, "Symmetry and Duality in Normal Basis Multiplication," Proc. Applied Algebra, Algebraic Algorithms, and Error Correcting Codes Symp. (AAECC-6), pp. 230-238, July 1988.
-
(1988)
Proc. Applied Algebra, Algebraic Algorithms, and Error Correcting Codes Symp. (AAECC-6)
, pp. 230-238
-
-
Geiselmann, W.1
Gollmann, D.2
-
16
-
-
0024750016
-
m)"
-
Oct
-
m)," IEEE Trans. Computers, vol. 38, no. 10, pp. 1383-1386, Oct. 1989.
-
(1989)
IEEE Trans. Computers
, vol.38
, Issue.10
, pp. 1383-1386
-
-
Feng, M.1
-
17
-
-
0003508562
-
-
Nat'l Inst. of Standards and Technology, FIPS Publication 186-2, Jan
-
Nat'l Inst. of Standards and Technology, Digital Signature Standard FIPS Publication 186-2, Jan. 2000.
-
(2000)
Digital Signature Standard
-
-
-
18
-
-
0000753472
-
"Low Complexity Normal Bases"
-
D.W. Ash, I.F. Blake, and S.A. Vanstone, "Low Complexity Normal Bases," Discrete Applied Math., vol. 25, pp. 191-210, 1989.
-
(1989)
Discrete Applied Math.
, vol.25
, pp. 191-210
-
-
Ash, D.W.1
Blake, I.F.2
Vanstone, S.A.3
-
19
-
-
0242578167
-
"Constructing Composite Field Representations for Efficient Conversion"
-
Nov
-
B. Sunar, E. Savas, and C.K. Koc, "Constructing Composite Field Representations for Efficient Conversion," IEEE Trans. Computers, vol. 52, no. 11, pp. 1391-1398, Nov. 2003.
-
(2003)
IEEE Trans. Computers
, vol.52
, Issue.11
, pp. 1391-1398
-
-
Sunar, B.1
Savas, E.2
Koc, C.K.3
-
20
-
-
0034291075
-
"Efficient Normal Basis Multipliers in Composite Fields"
-
Oct
-
S. Oh, C.H. Kim, J. Lim, and D.H. Cheon, "Efficient Normal Basis Multipliers in Composite Fields," IEEE Trans. Computers, vol. 49, no. 10, pp. 1133-1138, Oct. 2000.
-
(2000)
IEEE Trans. Computers
, vol.49
, Issue.10
, pp. 1133-1138
-
-
Oh, S.1
Kim, C.H.2
Lim, J.3
Cheon, D.H.4
-
21
-
-
0033204715
-
"Fast Arithmetic for Public-Key Algorithms in Galois Fields with Composite Exponents"
-
Oct
-
C. Paar, P. Fleishmann, and P. Soria-Rodriguez, "Fast Arithmetic for Public-Key Algorithms in Galois Fields with Composite Exponents," IEEE Trans. Computers, vol. 48, no. 10, pp. 1025-1034, Oct. 1999.
-
(1999)
IEEE Trans. Computers
, vol.48
, Issue.10
, pp. 1025-1034
-
-
Paar, C.1
Fleishmann, P.2
Soria-Rodriguez, P.3
-
24
-
-
84945129506
-
"How Secure Are Elliptic Curves over Composite Extension Fields?"
-
N.P. Smart, "How Secure Are Elliptic Curves over Composite Extension Fields?" Proc. Eurocrypt 2001, pp. 30-39, 2001.
-
(2001)
Proc. Eurocrypt 2001
, pp. 30-39
-
-
Smart, N.P.1
-
25
-
-
11344252143
-
"Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree"
-
M. Maurer, A. Menezes, and E. Teske, "Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree," LMS J. Computation and Math., vol. 5, pp. 127-174, 2002.
-
(2002)
LMS J. Computation and Math.
, vol.5
, pp. 127-174
-
-
Maurer, M.1
Menezes, A.2
Teske, E.3
-
26
-
-
84974687517
-
"A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography"
-
Dec
-
M. Ciet, J.-J. Quisquater, and F. Sica, "A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography," Proc. Indocrypt 2001, pp. 108-116, Dec. 2001.
-
(2001)
Proc. Indocrypt 2001
, pp. 108-116
-
-
Ciet, M.1
Quisquater, J.-J.2
Sica, F.3
-
27
-
-
3242725230
-
m)"
-
Aug
-
m)," IEEE Trans. Computers, vol. 53, no. 8, pp. 945-959, Aug. 2004.
-
(2004)
IEEE Trans. Computers
, vol.53
, Issue.8
, pp. 945-959
-
-
Reyhani-Masoleh, A.1
Hasan, M.A.2
-
28
-
-
0000620374
-
"A New Architecture for a Parallel Finite Field Multiplier with Low Complexity Based on Composite Fields"
-
July
-
C. Paar, "A New Architecture for a Parallel Finite Field Multiplier with Low Complexity Based on Composite Fields," IEEE Trans. Computers, vol. 45, no. 7, pp. 856-861, July 1996.
-
(1996)
IEEE Trans. Computers
, vol.45
, Issue.7
, pp. 856-861
-
-
Paar, C.1
-
30
-
-
0031369480
-
"A Search of Minimal Key Functions for Normal Basis Multipliers"
-
May
-
C.-C. Lu, "A Search of Minimal Key Functions for Normal Basis Multipliers," IEEE Trans. Computers, vol. 46, no. 5, pp. 588-592, May 1997.
-
(1997)
IEEE Trans. Computers
, vol.46
, Issue.5
, pp. 588-592
-
-
Lu, C.-C.1
|