메뉴 건너뛰기




Volumn 12, Issue 4, 2007, Pages 245-258

High-performance public-key cryptoprocessor for wireless mobile applications

Author keywords

Binary fields; Elliptic curve cryptography(ECC); Parallel processing; Public key cryptosystem

Indexed keywords

DIGITAL ARITHMETIC; MOBILE COMPUTING; PARALLEL PROCESSING SYSTEMS; PROGRAM PROCESSORS;

EID: 35348878140     PISSN: 1383469X     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11036-007-0020-6     Document Type: Article
Times cited : (19)

References (36)
  • 2
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • 2
    • Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120-126
    • (1978) Commun ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 3
    • 0000112683 scopus 로고
    • Elliptic curve cryptosystem
    • Koblitz N (1987) Elliptic curve cryptosystem. Math Comput 48:203-209
    • (1987) Math Comput , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 4
    • 85015402934 scopus 로고
    • Uses of elliptic curves in cryptography
    • Williams HC (ed) Advances in cryptology: Proceedings of CRYPTO'85. Springer
    • Miller V (1985) Uses of elliptic curves in cryptography. In: Williams HC (ed) Advances in cryptology: Proceedings of CRYPTO'85, number 218 in lecture notes in computer science. Springer, pp 417-426
    • (1985) Lecture Notes in Computer Science , vol.218 , pp. 417-426
    • Miller, V.1
  • 6
    • 33645232695 scopus 로고    scopus 로고
    • Area-throughput trade-offs for fully pipelined 30 to 70 Gbits/s AES processors
    • 4. April
    • Hodjat A, Verbauwhede I (2006) Area-throughput trade-offs for fully pipelined 30 to 70 Gbits/s AES processors. IEEE Trans Comput 55(4):366-372, April
    • (2006) IEEE Trans Comput , vol.55 , pp. 366-372
    • Hodjat, A.1    Verbauwhede, I.2
  • 8
  • 9
    • 84876375076 scopus 로고    scopus 로고
    • Low-cost elliptic curve cryptography for wireless sensor networks
    • Proceedings of Third European Workshop on Security and Privacy in Ad Hoc and Sensor Networks. Springer
    • Batina L, Mentens N, Sakiyama K, Preneel B, Verbauwhede I (2006) Low-cost elliptic curve cryptography for wireless sensor networks. In: Proceedings of Third European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, number 4357 in lecture notes in computer science. Springer, pp 415-429
    • (2006) Lecture Notes in Computer Science , vol.4357 , pp. 415-429
    • Batina, L.1    Mentens, N.2    Sakiyama, K.3    Preneel, B.4    Verbauwhede, I.5
  • 10
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • 2. February
    • Juels A (2006) RFID security and privacy: a research survey. IEEE J Sel Areas Commun 24(2):381-394, February
    • (2006) IEEE J Sel Areas Commun , vol.24 , pp. 381-394
    • Juels, A.1
  • 11
    • 84957715741 scopus 로고    scopus 로고
    • Universally verifiable mix-net with verification work independent of the number of mix-servers
    • Nyberg N (ed) Advances in cryptology: proceedings of EUROCRYPT'98. Springer
    • Abe M (1998) Universally verifiable mix-net with verification work independent of the number of mix-servers. In: Nyberg N (ed) Advances in cryptology: proceedings of EUROCRYPT'98, number 1403 in lecture notes in computer science. Springer, pp 437-447
    • (1998) Lecture Notes in Computer Science , vol.1403 , pp. 437-447
    • Abe, M.1
  • 13
    • 33745177806 scopus 로고    scopus 로고
    • Private searching on streaming data
    • Shoup V (ed) Advances in cryptology: proceedings of CRYPTO'05. Springer
    • Ostrovsky R, WE Skeith III (2005) Private searching on streaming data. In: Shoup V (ed) Advances in cryptology: proceedings of CRYPTO'05, number 3621 in lecture notes in computer science. Springer, pp 223-240
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 223-240
    • Ostrovsky, R.1    Skeith Iii, W.E.2
  • 16
    • 0003508562 scopus 로고    scopus 로고
    • US Department of Commerce and National Institute of Standards and Technology, FIPS PUB 186-2, January
    • US Department of Commerce and National Institute of Standards and Technology (2000) Digital signature standard (DSS), FIPS PUB 186-2, January
    • (2000) Digital Signature Standard (DSS)
  • 17
    • 84968484435 scopus 로고
    • Speeding the Pollard and elliptic curve methods of factorization
    • 177
    • Montgomery P (1987) Speeding the Pollard and elliptic curve methods of factorization. Math Comput 48(177):243-264
    • (1987) Math Comput , vol.48 , pp. 243-264
    • Montgomery, P.1
  • 18
    • 0010029876 scopus 로고    scopus 로고
    • Efficient arithmetic on koblitz curves
    • Solinas J (2000) Efficient arithmetic on koblitz curves. Designs Codes Cryptogr 19:195-249
    • (2000) Designs Codes Cryptogr , vol.19 , pp. 195-249
    • Solinas, J.1
  • 19
    • 0038462786 scopus 로고
    • A fast elliptic curve cryptosystem
    • Quisquater J-J, Vandewalle J (eds) Advances in cryptology: proceedings of EUROCRYPT'89. Springer
    • Agnew GB, Mullin RC, Vanstone SA (1989) A fast elliptic curve cryptosystem. In: Quisquater J-J, Vandewalle J (eds) Advances in cryptology: proceedings of EUROCRYPT'89, number 434 in lecture notes in computer science. Springer, pp 706-708
    • (1989) Lecture Notes in Computer Science , vol.434 , pp. 706-708
    • Agnew, G.B.1    Mullin, R.C.2    Vanstone, S.A.3
  • 21
    • 68549097842 scopus 로고    scopus 로고
    • m )
    • Koç ÇK, Paar C (eds) Proceedings of 2nd International Workshop on Cryptograpic Hardware and Embedded Systems (CHES). Springer-Verlag
    • m ). In: Koç ÇK, Paar C (eds) Proceedings of 2nd International Workshop on Cryptograpic Hardware and Embedded Systems (CHES), number 1965 in lecture notes in computer science. Springer-Verlag, pp 41-56
    • (2000) Lecture Notes in Computer Science , vol.1965 , pp. 41-56
    • Orlando, G.1    Paar, C.2
  • 24
    • 0141831855 scopus 로고    scopus 로고
    • A scalable architecture for modular multiplication based on Montgomerys algorithm
    • 9. September
    • Tenca AF, Koç ÇK (2003) A scalable architecture for modular multiplication based on Montgomerys algorithm. IEEE Trans Comput 52(9):1215-1221, September
    • (2003) IEEE Trans Comput , vol.52 , pp. 1215-1221
    • Tenca, A.F.1    Koç, Ç.K.2
  • 26
    • 33750738116 scopus 로고    scopus 로고
    • A reconfigurable processor for high speed point multiplication in elliptic curves
    • 2005
    • Saqib NA, Rodríguez-Henruez F, Díaz-Prez, A (2005) A reconfigurable processor for high speed point multiplication in elliptic curves. Int J of Embed Syst 2005 1(3/4):237-249
    • (2005) Int J of Embed Syst , vol.1 , Issue.3-4 , pp. 237-249
    • Saqib, N.A.1    Rodríguez-Henruez, F.2    Díaz-Prez, A.3
  • 28
    • 33750695616 scopus 로고    scopus 로고
    • Superscalar coprocessor for high-speed curve-based cryptography
    • Goublin L, Matsui M (eds) Proceedings of 8th International Workshop on Cryptographic Hardware and Embedded Systems (CHES). Springer
    • Sakiyama K, Batina L, Preneel B, Verbauwhede I (2006) Superscalar coprocessor for high-speed curve-based cryptography. In: Goublin L, Matsui M (eds) Proceedings of 8th International Workshop on Cryptographic Hardware and Embedded Systems (CHES), number 4249 in lecture notes in computer science. Springer, pp 415-429
    • (2006) Lecture Notes in Computer Science , vol.4249 , pp. 415-429
    • Sakiyama, K.1    Batina, L.2    Preneel, B.3    Verbauwhede, I.4
  • 30
    • 15544368414 scopus 로고    scopus 로고
    • An elementary introduction to hyperelliptic curves-appendix
    • Koblitz N (ed). Springer
    • Menezes A, Wu Y-H, Zuccherato R (1998) An elementary introduction to hyperelliptic curves-appendix. In: Koblitz N (ed) Algebraic aspects of cryptography. Springer, pp 155-178
    • (1998) Algebraic Aspects of Cryptography , pp. 155-178
    • Menezes, A.1    Wu, Y.-H.2    Zuccherato, R.3
  • 32
    • 84947913604 scopus 로고    scopus 로고
    • m )
    • Koç ÇK, Paar C (eds) Proceedings of 1st International Workshop on Cryptographic Hardware and Embedded Systems (CHES). Springer
    • m ). In: Koç ÇK, Paar C (eds) Proceedings of 1st International Workshop on Cryptographic Hardware and Embedded Systems (CHES), vol 1717 of lecture notes in computer science. Springer, pp 316-327
    • (1999) Lecture Notes in Computer Science , vol.1717 , pp. 316-327
    • López, J.1    Dahab, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.