-
1
-
-
47749139915
-
-
ARM Limited, available for download at, 2002
-
ARM Limited. SecurCore™ Solutions. Product brief, available for download at http://www.arm.com/miscPDFs/1665.pdf, 2002.
-
SecurCore™ Solutions. Product brief
-
-
-
2
-
-
47749139171
-
ARM Architecture Reference Manual. ARM Doc
-
ARM Limited
-
ARM Limited. ARM Architecture Reference Manual. ARM Doc No. DDI-0100, Issue H, 2003.
-
(2003)
DDI-0100, Issue H
-
-
-
3
-
-
10444273896
-
Exponentiation cryptosystems on the IBM PC
-
Dec
-
P. G. Comba. Exponentiation cryptosystems on the IBM PC. IBM Systems Journal, 29(4):526-538, Dec. 1990.
-
(1990)
IBM Systems Journal
, vol.29
, Issue.4
, pp. 526-538
-
-
Comba, P.G.1
-
6
-
-
85034490362
-
-
S. R. Dussé and B. S. Kaliski. A cryptographic library for the Motorola DSP56000. In Advances in Cryptology - EUROCRYPT '90, LNCS 473, pp. 230-244. Springer Verlag, 1991.
-
S. R. Dussé and B. S. Kaliski. A cryptographic library for the Motorola DSP56000. In Advances in Cryptology - EUROCRYPT '90, LNCS 473, pp. 230-244. Springer Verlag, 1991.
-
-
-
-
7
-
-
20344383999
-
Accelerating next-generation public-key cryptosystems on general-purpose CPUs
-
Mar
-
H. Eberle, S. Chang Shantz, V. Gupta, N. Gura, L. D. Rarick, and L. A. Spracklen. Accelerating next-generation public-key cryptosystems on general-purpose CPUs. IEEE Micro, 25(2):52-59, Mar. 2005.
-
(2005)
IEEE Micro
, vol.25
, Issue.2
, pp. 52-59
-
-
Eberle, H.1
Chang Shantz, S.2
Gupta, V.3
Gura, N.4
Rarick, L.D.5
Spracklen, L.A.6
-
8
-
-
47749114840
-
-
J. Gaisler. The LEON-2 Processor User's Manual (Version 1.0.30). Available for download at http://www.gaisler.com, 2005.
-
J. Gaisler. The LEON-2 Processor User's Manual (Version 1.0.30). Available for download at http://www.gaisler.com, 2005.
-
-
-
-
9
-
-
0242277358
-
Architectural enhancements for Montgomery multiplication on embedded RISC processors
-
Applied Cryptography and Network Security, ACNS 2003, Springer Verlag
-
J. Großschädl and G.-A. Kamendje. Architectural enhancements for Montgomery multiplication on embedded RISC processors. In Applied Cryptography and Network Security - ACNS 2003, LNCS 2846, pp. 418-434. Springer Verlag, 2003.
-
(2003)
LNCS
, vol.2846
, pp. 418-434
-
-
Großschädl, J.1
Kamendje, G.-A.2
-
11
-
-
38149113740
-
Cryptography instruction set extensions to the SPARC V8 architecture. Preprint
-
submitted for publication
-
J. Großschädl, S. Tillich, A. Szekely, and M. Wurm. Cryptography instruction set extensions to the SPARC V8 architecture. Preprint, submitted for publication, 2007.
-
(2007)
-
-
Großschädl, J.1
Tillich, S.2
Szekely, A.3
Wurm, M.4
-
13
-
-
47749144627
-
-
Intel Corporation. Intel® IA-64 Architecture Software Reference Manual, 3: Instruction Set Reference (Revision 1.1). Document Number: 245319-002, July 2000.
-
Intel Corporation. Intel® IA-64 Architecture Software Reference Manual, Volume 3: Instruction Set Reference (Revision 1.1). Document Number: 245319-002, July 2000.
-
-
-
-
14
-
-
22544448109
-
A reusable Duff device
-
Aug
-
R. Holly. A reusable Duff device. Dr. Dobb's Journal 30(8):73-74, Aug. 2005.
-
(2005)
Dr. Dobb's Journal
, vol.30
, Issue.8
, pp. 73-74
-
-
Holly, R.1
-
16
-
-
0003683288
-
High-speed RSA implementation
-
Nov. 1994, RSA Data Security, Inc. Available for download at
-
Ç. K. Koç. High-speed RSA implementation. Technical Report TR 201 (Nov. 1994), RSA Data Security, Inc. Available for download at ftp://ftp.rsasecurity.com/pub/pdfs/tr201.pdf.
-
Technical Report TR
, vol.201
-
-
Koç, C.K.1
-
17
-
-
0030172012
-
Analyzing and comparing Montgomery multiplication algorithms
-
June
-
Ç. K. Koç, T. Acar, and B. S. Kaliski. Analyzing and comparing Montgomery multiplication algorithms. IEEE Micro, 16(3):26-33, June 1996.
-
(1996)
IEEE Micro
, vol.16
, Issue.3
, pp. 26-33
-
-
Koç, C.K.1
Acar, T.2
Kaliski, B.S.3
-
20
-
-
34047187756
-
-
MIPS Technologies, Inc. SmartMIPS™ Architecture Smart Card Extensions, available for download at, 2001
-
MIPS Technologies, Inc. SmartMIPS™ Architecture Smart Card Extensions. Product brief, available for download at http://www.mips.com, 2001.
-
Product brief
-
-
-
21
-
-
47749155506
-
-
MIPS Technologies, Inc. Making smart cards secure, Fall, Available for download at
-
MIPS Technologies, Inc. Making smart cards secure. The Pipeline (Technology Newsletter), p. 4, Fall 2001. Available for download at http://www.mips.com.
-
(2001)
The Pipeline (Technology Newsletter)
, pp. 4
-
-
-
22
-
-
47749147161
-
-
MIPS Technologies, Inc. MIPS32™ Architecture for Programmers IV-d: Available for download at, 2003
-
MIPS Technologies, Inc. MIPS32™ Architecture for Programmers Volume IV-d: The SmartMIPS™ Application-Specific Extension to the MIPS32™ Architecture. Available for download at http://www.mips.com, 2003.
-
The SmartMIPS™ Application-Specific Extension to the MIPS32™ Architecture
-
-
-
23
-
-
84966243285
-
Modular multiplication without trial division
-
Apr
-
P. L. Montgomery. Modular multiplication without trial division. Mathematics of Computation, 44(170):519-521, Apr. 1985.
-
(1985)
Mathematics of Computation
, vol.44
, Issue.170
, pp. 519-521
-
-
Montgomery, P.L.1
-
24
-
-
48349090011
-
-
NEC Electronics Europe GmbH, available for download at, Apr. 2003
-
NEC Electronics Europe GmbH. V-WAY32 32-bit Security Cryptocontroller. Product letter, available for download at http://www.eu.necel.com/_pdf/ U16674EE1V0PL00.PDF, Apr. 2003.
-
V-WAY32 32-bit Security Cryptocontroller. Product letter
-
-
-
28
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Feb
-
R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2):120-126, Feb. 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
29
-
-
47749111931
-
-
M. P. Scott. Comparison of methods for modular exponentiation on 32-bit Intel 80x86 processors. Draft, available for download at ftp://ftp.computing. dcu.ie/pub/crypto/timings.ps, 1996.
-
M. P. Scott. Comparison of methods for modular exponentiation on 32-bit Intel 80x86 processors. Draft, available for download at ftp://ftp.computing. dcu.ie/pub/crypto/timings.ps, 1996.
-
-
-
-
30
-
-
0034275098
-
Itanium processor microarchitecture
-
Sept./Oct
-
H. Sharangpani and K. Arora. Itanium processor microarchitecture. IEEE Micro, 20(5):24-43, Sept./Oct. 2000.
-
(2000)
IEEE Micro
, vol.20
, Issue.5
, pp. 24-43
-
-
Sharangpani, H.1
Arora, K.2
-
31
-
-
1942521587
-
Physical side-channel attacks on cryptographic systems
-
Dec, Available online at
-
N. P. Smart. Physical side-channel attacks on cryptographic systems. Software Focus, 1(2):6-13, Dec. 2000. Available online at http://www.wiley.co.uk/softwarefocus/web.pdf.
-
(2000)
Software Focus
, vol.1
, Issue.2
, pp. 6-13
-
-
Smart, N.P.1
-
32
-
-
47749119033
-
-
SPARC International, Inc. The SPARC Architecture Manual Version 8 (Revision SAV080SI9308). Available for download at http://www.sparc.org/ standards/V8.pdf, 1993.
-
SPARC International, Inc. The SPARC Architecture Manual Version 8 (Revision SAV080SI9308). Available for download at http://www.sparc.org/ standards/V8.pdf, 1993.
-
-
-
-
33
-
-
47749112698
-
ST22XJ64 smartcard 32-bit RISC MCU with 64 kbytes EEPROM and Javacard™ hardware execution
-
STMicroelectronics, Inc, Sept
-
STMicroelectronics, Inc. ST22XJ64 smartcard 32-bit RISC MCU with 64 kbytes EEPROM and Javacard™ hardware execution. Data Briefing, Sept. 2001.
-
(2001)
Data Briefing
-
-
-
34
-
-
47749146361
-
-
Sun Microsystems, Inc. Sun Microsystems completes design tape-out for next-generation, breakthrough UltraSPARC T2 CoolThreads processor. Press Release, available online at http://www.sun.com/smi/Press/sunflash/2006-04/ sunflash.20060412.2.xml, 2006.
-
Sun Microsystems, Inc. Sun Microsystems completes design tape-out for next-generation, breakthrough UltraSPARC T2 CoolThreads processor. Press Release, available online at http://www.sun.com/smi/Press/sunflash/2006-04/ sunflash.20060412.2.xml, 2006.
-
-
-
|