-
1
-
-
0010579872
-
-
ARM7TDMI (Rev 3)
-
ARM Limited. ARM7TDMI (Rev 3) - Technical Reference Manual, http://www.arm.com/pdfs/DDI0029G_7TDMI_R3_trm.pdf, 2001.
-
(2001)
Technical Reference Manual
-
-
-
2
-
-
33644995083
-
Some integer factorization algorithms using elliptic curves
-
R. P. Brent. Some Integer Factorization Algorithms Using Elliptic Curves. In Australian Computer Science Communications 8, pages 149-163, 1986.
-
(1986)
Australian Computer Science Communications
, vol.8
, pp. 149-163
-
-
Brent, R.P.1
-
3
-
-
33746111069
-
Comparison of two implementations of scalable montgomery coprocessor embedded in reconfigurable hardware
-
DC/5 2004, Bordeaux, France, Nov. 24-26
-
M. Drutarovský, V. Fischer, and M. Šimka. Comparison of two implementations of scalable Montgomery coprocessor embedded in reconfigurable hardware. In Proceedings of the XIX Conference on Design of Circuits and Integrated Systems - DC/5 2004, pages 240-245, Bordeaux, France, Nov. 24-26, 2004.
-
(2004)
Proceedings of the XIX Conference on Design of Circuits and Integrated Systems
, pp. 240-245
-
-
Drutarovský, M.1
Fischer, V.2
Šimka, M.3
-
4
-
-
33746152275
-
-
Dec.
-
J. Franke, T. Kleinjung, F. Bahr, M. Lochter, and M. Bohm. E-mail announcement. http://www.crypto-world.com/announcements/rsa576. txt, Dec. 2003.
-
(2003)
E-mail Announcement
-
-
Franke, J.1
Kleinjung, T.2
Bahr, F.3
Lochter, M.4
Bohm, M.5
-
5
-
-
33744902565
-
SHARK - A realizable special hardware sieving device for factoring 1024-bit integers
-
Paris, France, Feb. 24-25
-
J. Franke, T. Kleinjung, C. Paar, J. Pelzl, C. Priplata, and C. Stahlke. SHARK - A Realizable Special Hardware Sieving Device for Factoring 1024-bit Integers. In 1st Workshop on Special-purpose Hardware for Attacking Cryptographic Systems - SHARCS 2005, Paris, France, Feb. 24-25, 2005.
-
(2005)
1st Workshop on Special-purpose Hardware for Attacking Cryptographic Systems - SHARCS 2005
-
-
Franke, J.1
Kleinjung, T.2
Paar, C.3
Pelzl, J.4
Priplata, C.5
Stahlke, C.6
-
6
-
-
35248885280
-
An end-to-end systems approach to elliptic curve cryptography
-
Ç. K. Koç and C. Paar, editors. Springer-Verlag
-
N. Gura, S. Chang, H. 2, G. Sumit, V. Gupta, D. Finchelstein, E. Goupy, and D. Stebila. An End-to-End Systems Approach to Elliptic Curve Cryptography. In Ç. K. Koç and C. Paar, editors. Cryptographic Hardware and Embedded Systems - CHES 2002, volume LNCS 2523, pages 349-365. Springer-Verlag, 2002.
-
(2002)
Cryptographic Hardware and Embedded Systems - CHES 2002
, vol.LNCS 2523
, pp. 349-365
-
-
Gura, N.1
Chang, S.2
Sumit, H.G.3
Gupta, V.4
Finchelstein, D.5
Goupy, E.6
Stebila, D.7
-
8
-
-
0001258323
-
Factoring integers with elliptic curves
-
H. W. Lenstra. Factoring Integers with Elliptic Curves. Annals of Mathematics, 126(2):649-673, 1987.
-
(1987)
Annals of Mathematics
, vol.126
, Issue.2
, pp. 649-673
-
-
Lenstra, H.W.1
-
9
-
-
84968484435
-
Speeding up the Pollard and elliptic curve methods of factorization
-
P. Montgomery. Speeding up the Pollard and elliptic curve methods of factorization. Mathematics of Computation, 48:243-264, 1987.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 243-264
-
-
Montgomery, P.1
-
10
-
-
33947673205
-
A scalable GF(p) elliptic curve processor architecture for programmable hardware
-
Ç. K. Koç, D. Naccache, and C. Paar, editors, Springer-Verlag, May 14-16
-
G. Orlando and C. Paar. A Scalable GF(p) Elliptic Curve Processor Architecture for Programmable Hardware. In Ç. K. Koç, D. Naccache, and C. Paar, editors, Workshop on Cryptographic Hardware and Embedded Systems - CHES 2001, volume LNCS 2162, pages 348-363. Springer-Verlag, May 14-16, 2001.
-
(2001)
Workshop on Cryptographic Hardware and Embedded Systems - CHES 2001
, vol.LNCS 2162
, pp. 348-363
-
-
Orlando, G.1
Paar, C.2
-
12
-
-
35248849882
-
Factoring large numbers with the TWIRL device
-
Advances in Cryptology - Crypto 2003, Springer
-
A. Shamir and E. Tromer. Factoring Large Numbers with the TWIRL Device. In Advances in Cryptology - Crypto 2003, volume 2729 of LNCS, pages 1-26. Springer, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 1-26
-
-
Shamir, A.1
Tromer, E.2
-
13
-
-
0141831855
-
A scalable architecture for modular multiplication based on montgomery's algorithm
-
A. Tenca and Ç.K. Koç. A Scalable Architecture for Modular Multiplication Based on Montgomery's Algorithm. IEEE Trans. Comput., 52(9): 1215-1221, 2003.
-
(2003)
IEEE Trans. Comput.
, vol.52
, Issue.9
, pp. 1215-1221
-
-
Tenca, A.1
Koç, Ç.K.2
-
14
-
-
84944900219
-
Precise bounds for montgomery modular multiplication and some potentially insecure RSA moduli
-
B. Preneel, editor, Proceedings of Topics in Cryptology- CT-RSA 2002
-
C. D. Walter. Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli. In B. Preneel, editor, Proceedings of Topics in Cryptology- CT-RSA 2002, volume 2271 of Lecture Notes in Computer Science, pages 30-39, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2271
, pp. 30-39
-
-
Walter, C.D.1
|