메뉴 건너뛰기




Volumn 2, Issue , 2002, Pages

Area efficient GF(p) architectures for GF(pm) multipliers

Author keywords

[No Author keywords available]

Indexed keywords

BOOLEAN FUNCTIONS; COMPUTATIONAL COMPLEXITY; LOGIC DESIGN; SEQUENTIAL CIRCUITS;

EID: 18544405923     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (4)

References (10)
  • 1
    • 0001224411 scopus 로고    scopus 로고
    • Efficient arithmetic in finite field extensions with application in elliptic curve cryptography
    • D. V. Bailey and C. Paar. Efficient arithmetic in finite field extensions with application in elliptic curve cryptography, Journal of Cryptology, 14(3):153-176, 2001.
    • (2001) Journal of Cryptology , vol.14 , Issue.3 , pp. 153-176
    • Bailey, D.V.1    Paar, C.2
  • 3
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • J. Kilian, editor, LNCS 2139. Springer-Verlag
    • D. Boneh and M. Franklin. Identity-Based Encryption from the Weil Pairing. In J. Kilian, editor, Advances in Cryptology - CRYPTO 2001, volume LNCS 2139, pages 213-229. Springer-Verlag, 2001.
    • (2001) Advances in Cryptology - CRYPTO 2001 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 4
  • 6
    • 84957705004 scopus 로고    scopus 로고
    • An elliptic curve implementation of the finite field digital signature algorithm
    • H. Krawczyk, editor, volume LNCS 1462, Springer-Verlag
    • Neal Koblitz. An elliptic curve implementation of the finite field digital signature algorithm. In H. Krawczyk, editor, Advances in Cryptology - CRYPTO 98, volume LNCS 1462, pages 327-337. Springer-Verlag, 1998.
    • (1998) Advances in Cryptology - CRYPTO 98 , pp. 327-337
    • Koblitz, N.1
  • 9
    • 0000702044 scopus 로고    scopus 로고
    • Elliptic curve cryptosystems over small fields of odd characteristic
    • Spring
    • N. Smart. Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic. Journal of Cryptology, 12(2):141-151, Spring 1999.
    • (1999) Journal of Cryptology , vol.12 , Issue.2 , pp. 141-151
    • Smart, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.