-
2
-
-
0036385605
-
Efficient architectures for implementing montgomery modular multiplication and RSA modular exponentiation on reconfigurable logic
-
ACM Press, Feb
-
th International Symposium on FPGAs, pages 40-49. ACM Press, Feb 2002.
-
(2002)
th International Symposium on FPGAs
, pp. 40-49
-
-
Daly, A.1
Marnane, W.2
-
3
-
-
2642517965
-
An FPGA implementation of a GF(p) ALU for encryption processors
-
A. Daly, W. Marnane, T. Kerins, and E. Popovici. An FPGA Implementation of a GF(p) ALU for Encryption Processors. Elsevier Journal on Microprocessors and Microsystems (Special issue on FPGAs: Applications and Designs), 28(5-6):253-260, 2004.
-
(2004)
Elsevier Journal on Microprocessors and Microsystems (Special Issue on FPGAs: Applications and Designs)
, vol.28
, Issue.5-6
, pp. 253-260
-
-
Daly, A.1
Marnane, W.2
Kerins, T.3
Popovici, E.4
-
6
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz. Elliptic curve cryptosystems. Mathematics of Computation, 48:203-209, 1987.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
7
-
-
4444331720
-
Security as a new dimension in embedded system design
-
June
-
P. Kocher, R.Lee, G. McGraw, A. Raghunathan, and S. Ravi. Security as a new dimension in embedded system design. In Proc. of the 41st IEEE Design Automation Conference, pages 753-760, June 2004.
-
(2004)
Proc. of the 41st IEEE Design Automation Conference
, pp. 753-760
-
-
Kocher, P.1
Lee, R.2
McGraw, G.3
Raghunathan, A.4
Ravi, S.5
-
8
-
-
85015402934
-
Use of elliptic curves in cryptography
-
Advances in Cryptology - CRYPTO '85
-
V. S. Miller. Use of elliptic curves in cryptography. Advances in Cryptology - CRYPTO '85, 218 of Lecture Notes in Computer Science:417-426, 1985.
-
(1985)
Lecture Notes in Computer Science
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
9
-
-
84966243285
-
Modular multiplication without trial division
-
P. L. Montgomery. Modular multiplication without trial division. Mathematics of Computations, 44(170):519-521, 1985.
-
(1985)
Mathematics of Computations
, vol.44
, Issue.170
, pp. 519-521
-
-
Montgomery, P.L.1
-
10
-
-
0017930809
-
A Method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman. A Method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2): 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
12
-
-
0038300434
-
A scalable dual-field elliptic curve cryptographic processor
-
April
-
A. Satoh and K. Takano. A Scalable Dual-Field Elliptic Curve Cryptographic Processor. IEEE Transactions on Computers, 52:449-460, April 2003.
-
(2003)
IEEE Transactions on Computers
, vol.52
, pp. 449-460
-
-
Satoh, A.1
Takano, K.2
-
13
-
-
0141831855
-
A scalable architecture for modular multiplication based on Montgomery's algorithm
-
Sep
-
A. F. Tenca and C. K. Koc. A scalable architecture for modular multiplication based on Montgomery's algorithm. IEEE Transactions on Computers, 52(9): 1215-1221, Sep 2003.
-
(2003)
IEEE Transactions on Computers
, vol.52
, Issue.9
, pp. 1215-1221
-
-
Tenca, A.F.1
Koc, C.K.2
-
14
-
-
0035341885
-
Reconfigurable computing for digital signal processing: A survey
-
May/June
-
R. Tessier and W. Burleson. Reconfigurable Computing for Digital Signal Processing: A Survey. Journal of VLSI Signal Processing, 28:7-27, May/June 2001.
-
(2001)
Journal of VLSI Signal Processing
, vol.28
, pp. 7-27
-
-
Tessier, R.1
Burleson, W.2
-
15
-
-
24744469027
-
ECC holds key to next-gen cryptography
-
Certicom Corporation, March
-
S. Vanstone. ECC Holds Key to Next-Gen Cryptography. Technical report, Certicom Corporation, March 2004.
-
(2004)
Technical Report
-
-
Vanstone, S.1
-
16
-
-
0000094920
-
Systolic modular multiplication
-
March
-
C. D. Walter. Systolic Modular Multiplication. IEEE Transactions on Computers, 42(3):376-378, March 1993.
-
(1993)
IEEE Transactions on Computers
, vol.42
, Issue.3
, pp. 376-378
-
-
Walter, C.D.1
|