-
1
-
-
4544328538
-
-
IBM PCI cryptographic coprocessor, May, Manual
-
IBM PCI cryptographic coprocessor, May 2002. General Information Manual.
-
(2002)
General Information
-
-
-
3
-
-
0035390239
-
Brief contributions: High-radix Montgomery modular exponentiation on reconfigurable hardware
-
July
-
T. Blum and C. Paar. Brief contributions: high-radix Montgomery modular exponentiation on reconfigurable hardware. IEEE Transactions on Computers, 50(7):759-764, July 2001.
-
(2001)
IEEE Transactions on Computers
, vol.50
, Issue.7
, pp. 759-764
-
-
Blum, T.1
Paar, C.2
-
4
-
-
33646907395
-
A novel unified architecture for public-key cryptography
-
March
-
A. Cilardo, A. Mazzeo, N. Mazzocca, and L. Romano. A novel unified architecture for public-key cryptography. Proceeding of Design, Automation and Test in Europe Conference and Exhibition(DATE'05), pages 52-57, March 2005.
-
(2005)
Proceeding of Design, Automation and Test in Europe Conference and Exhibition(DATE'05)
, pp. 52-57
-
-
Cilardo, A.1
Mazzeo, A.2
Mazzocca, N.3
Romano, L.4
-
5
-
-
0035505389
-
An energy-efficient reconfigurable public-key cryptography processor
-
November
-
J. Goodman and A. P. Chandrakasan. An energy-efficient reconfigurable public-key cryptography processor. IEEE Journal of Solid-State Circuit, 36(11):1808-1820, November 2001.
-
(2001)
IEEE Journal of Solid-State Circuit
, vol.36
, Issue.11
, pp. 1808-1820
-
-
Goodman, J.1
Chandrakasan, A.P.2
-
6
-
-
1942455360
-
Design and implementation of a private and public key crypto processor and its application to a security system
-
Feberuary
-
H. W. Kim and S. Lee. Design and implementation of a private and public key crypto processor and its application to a security system. IEEE Transactions on Consumer Electronics, 50(1):214-224, Feberuary 2004.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 214-224
-
-
Kim, H.W.1
Lee, S.2
-
7
-
-
77956422477
-
An efficient implementation of the digital signature algorithm
-
September
-
P. Kitsos, N. Sklavos, and O. Koufopavlou. An efficient implementation of the digital signature algorithm. Electronics, Circuits and Systems, 2002. 9th International Conference on, 3:1151-1154, September 2002.
-
(2002)
Electronics, Circuits and Systems, 2002. 9th International Conference on
, vol.3
, pp. 1151-1154
-
-
Kitsos, P.1
Sklavos, N.2
Koufopavlou, O.3
-
8
-
-
33847705302
-
The Art of Computer Promgramming
-
Addison-Wesley
-
D. Knuth. The Art of Computer Promgramming: Vol.2, Seminumerical Algorithms. Addison-Wesley, 1981.
-
(1981)
Seminumerical Algorithms
, vol.2
-
-
Knuth, D.1
-
9
-
-
84939573910
-
Differential power analysis
-
August
-
P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. Advances in Cryptology - CRYPTO'99: 19th Annual International Cryptology Conference, Santa Barbara, California, USA, pages 388-397, August 1999.
-
(1999)
Advances in Cryptology - CRYPTO'99: 19th Annual International Cryptology Conference, Santa Barbara, California, USA
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
10
-
-
4444331720
-
Security as a new dimendion in embedded system design
-
June 7-11, San Diego, California, USA, June
-
P. Kocher, R. Lee, G. McGraw, A. Roughunathan, and S. Ravi. Security as a new dimendion in embedded system design. ACM DAC 2004, June 7-11, 2004, San Diego, California, USA, pages 753-760, June 2004.
-
(2004)
ACM DAC 2004
, pp. 753-760
-
-
Kocher, P.1
Lee, R.2
McGraw, G.3
Roughunathan, A.4
Ravi, S.5
-
11
-
-
85093467807
-
Design principles for tamper-resistent smartcard processors
-
May
-
O. Kömmerling and M. G. Kuhn. Design principles for tamper-resistent smartcard processors. Proceedings of the USENIX Workshop on smartcard technology, Chicago, Illinois, USA, pages 9-20, May 1999.
-
(1999)
Proceedings of the USENIX Workshop on smartcard technology, Chicago, Illinois, USA
, pp. 9-20
-
-
Kömmerling, O.1
Kuhn, M.G.2
-
12
-
-
0036501882
-
On a unified architecture for video-on-demand services
-
J. Y. B. Lee. On a unified architecture for video-on-demand services. IEEE Transactions on Multimedia, 4(1), 2002.
-
(2002)
IEEE Transactions on Multimedia
, vol.4
, Issue.1
-
-
Lee, J.Y.B.1
-
13
-
-
27944489026
-
A unified architecture for adaptive compression of data and code on embedded systems
-
January
-
H. Lekatsas, J. Henkel, V. Jakkula, and S. Chakradhar. A unified architecture for adaptive compression of data and code on embedded systems. 18th International Conference on VLSI Design, 2005, pages 117-123, January 2005.
-
(2005)
18th International Conference on VLSI Design, 2005
, pp. 117-123
-
-
Lekatsas, H.1
Henkel, J.2
Jakkula, V.3
Chakradhar, S.4
-
15
-
-
4344624969
-
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004 (ISCAS '04)
-
52:II:889-892, May
-
A. W. Ng, T. S. Ng, and K. W. Yip. A unified architecture of md5 and ripemd-160 hash algorithms. Proceedings of the 2004 International Symposium on Circuits and Systems, 2004 (ISCAS '04), 52:II:889-892, May 2004.
-
(2004)
-
-
Ng, A.W.1
Ng, T.S.2
Yip, K.W.3
-
16
-
-
33845432604
-
Probabilistic algorithm for testing primality
-
M. O. Rabin. Probabilistic algorithm for testing primality. Number Theory, 12:128-138, 1980.
-
(1980)
Number Theory
, vol.12
, pp. 128-138
-
-
Rabin, M.O.1
-
17
-
-
0030704439
-
Design and implementaion of a coprocessor for cryptography applications
-
March
-
A. Royo, J. Moran, and J. C. Lopez. Design and implementaion of a coprocessor for cryptography applications. European Design and Test Conference, pages 231-227, March 1997.
-
(1997)
European Design and Test Conference
, pp. 231-227
-
-
Royo, A.1
Moran, J.2
Lopez, J.C.3
-
18
-
-
0141831855
-
A scalable architecture for mudular multiplication based on Montgomery's algorithm
-
F. A. Tenca and K. z. Koc. A scalable architecture for mudular multiplication based on Montgomery's algorithm. IEEE Transactions on Computers, 52(9), 2003.
-
(2003)
IEEE Transactions on Computers
, vol.52
, Issue.9
-
-
Tenca, F.A.1
Koc, K.Z.2
-
20
-
-
33847723811
-
Efficient high radix modular multiplication for high-speed computing in re-configurable hardware
-
May
-
Y. Wang, J. Leiwo, and T. Srikanthan. Efficient high radix modular multiplication for high-speed computing in re-configurable hardware. IEEE International. Symposium on Circuits and Systems, pages 1226-1229, May 2005.
-
(2005)
IEEE International. Symposium on Circuits and Systems
, pp. 1226-1229
-
-
Wang, Y.1
Leiwo, J.2
Srikanthan, T.3
-
21
-
-
68549104046
-
Physical security devices for computer sub-systems: A suvey of attacks and defences. CHES 2000, LNCS 1965
-
S. H. Weingart. Physical security devices for computer sub-systems: A suvey of attacks and defences. CHES 2000, LNCS 1965, Springer-verlag Berlin Heidelberg 2000, pages 302-317, 2000.
-
(2000)
Springer-verlag Berlin Heidelberg 2000
, pp. 302-317
-
-
Weingart, S.H.1
|