-
2
-
-
2642517965
-
An FPGA implementation of a GF(p) ALU for encryption processors
-
Daly, A., Marnane, W., Kerins, T., Popovici, E., 2004. An FPGA implementation of a GF(p) ALU for encryption processors.Elsevier Microproces. Microsyst. 28, 5-6, 253-260.
-
(2004)
Elsevier Microproces. Microsyst.
, vol.28
, Issue.5-6
, pp. 253-260
-
-
Daly, A.1
Marnane, W.2
Kerins, T.3
Popovici, E.4
-
3
-
-
34547326549
-
Fast modular inversion in the Montgomery Domain on reconfigurable logic
-
University College Cork, Cork, Ireland
-
Daly, A., Marnaney, L., Popovici, E., 2004. Fast modular inversion in the Montgomery Domain on reconfigurable logic. Tech. rep., University College Cork, Cork, Ireland.
-
(2004)
Tech. rep.
-
-
Daly, A.1
Marnaney, L.2
Popovici, E.3
-
4
-
-
38049062497
-
Collision search for elliptic curve discrete logarithm over GF (2m) with FPGA
-
LNCS Springer
-
Dormale De., G., Bulens, P., and Quisquater, J. 2007. Collision search for elliptic curve discrete logarithm over GF (2m) with FPGA. In Proceedings of Workshop on Cryptograpic Hardware and Embedded Systems (CHES'07). LNCS Vol. 4727. Springer, 378.
-
(2007)
Proceedings of Workshop on Cryptograpic Hardware and Embedded Systems (CHES'07).
, vol.4727
, pp. 378
-
-
Dormale De, G.1
Bulens, P.2
Quisquater, J.3
-
6
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Elgamal, T., 1985. A public key cryptosystem and a signature scheme based on discrete logarithms.IEEE Trans. Inform. Theory 31, 469-472.
-
(1985)
IEEE Trans. Inform. Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
7
-
-
27244451341
-
SHARK-A realizable special hardware sieving device for factoring 1024-bit integers
-
Lecture Notes in Computer Science Springer
-
Franke, J., Kleinjung, T., Paar, C., Pelzl, J., Priplata, C., Stahlke, C., 2005. SHARK-A realizable special hardware sieving device for factoring 1024-bit integers. In Proceedings of Workshop on Cryptograpic Hardware and Embedded Systems (CHES'05). Lecture Notes in Computer Science, vol. 3659. Springer, 119-130.
-
(2005)
Proceedings of Workshop on Cryptograpic Hardware and Embedded Systems (CHES'05).
, vol.3659
, pp. 119-130
-
-
Franke, J.1
Kleinjung, T.2
Paar, C.3
Pelzl, J.4
Priplata, C.5
Stahlke, C.6
-
8
-
-
34748898949
-
Attacking elliptic curve cryptosystems with special-purpose hardware
-
ACM Press, New York, NY, USA
-
Guneysu, T., Paar, C., Pelzl, J., 2007. Attacking elliptic curve cryptosystems with special-purpose hardware. In Proceedings of the ACM/SIGDA 15th International Symposium on Field Programmable Gate Arrays (FPGA'07), ACM Press, New York, NY, USA, 207-215.
-
(2007)
Proceedings of the ACM/SIGDA 15th International Symposium on Field Programmable Gate Arrays (FPGA'07
, pp. 207-215
-
-
Guneysu, T.1
Paar, C.2
Pelzl, J.3
-
9
-
-
11244267013
-
-
Springer Verlag, Berlin, Germany
-
Hankerson, D., Menezes, A., Vanstone, S., 2004.Guide to Elliptic Curve Cryptography. Springer Verlag, Berlin, Germany.
-
(2004)
Guide to Elliptic Curve Cryptography.
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
10
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz, N., 1987. Elliptic curve cryptosystems.Math. Comput. 48, 203-209.
-
(1987)
Math. Comput.
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
11
-
-
77952538803
-
Breaking ciphers with COPACOBANA - A cost-optimized parallel code breaker
-
Springer-Verlag
-
Kumar, S., Paar, C., Pelzl, J., Pfeiffer, G., Schimmler, M., 2006. Breaking ciphers with COPACOBANA - A cost-optimized parallel code breaker. In Proceedings of Workshop on Cryptograpic Hardware and Embedded Systems (CHES'06). Springer-Verlag.
-
(2006)
Proceedings of Workshop on Cryptograpic Hardware and Embedded Systems (CHES'06).
-
-
Kumar, S.1
Paar, C.2
Pelzl, J.3
Pfeiffer, G.4
Schimmler, M.5
-
12
-
-
0000653210
-
Selecting Cryptographic key sizes
-
Lenstra, A., Verheul, E., 2001. Selecting Cryptographic key sizes.J. Cryptol. 14, 4, 255-293.
-
(2001)
J. Cryptol.
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.1
Verheul, E.2
-
13
-
-
84944878354
-
-
CRC Press, New York, NY
-
Menezes, A. J., Oorschot Van., P. C., and Vanstone, S. A. 1996.Handbook of Applied Cryptography. CRC Press, New York, NY.
-
(1996)
Handbook of Applied Cryptography.
-
-
Menezes, A.J.1
Oorschot Van, P.C.2
Vanstone, S.A.3
-
14
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
H. C. Williams, Ed. Vol. Lecture Notes in Computer Science Springer
-
Miller, V., 1986. Uses of elliptic curves in cryptography. In Advances in Cryptology- (CRYPTO'85), H. C. Williams, Ed. Vol. Lecture Notes in Computer Science, 218. Springer, 417-426.
-
(1986)
Advances in Cryptology- (CRYPTO'85
, vol.218
, pp. 417-426
-
-
Miller, V.1
-
16
-
-
84942517531
-
Hardware implementation of elliptic curve processor over
-
Ors, S., Batina, L., Preneel, B., Vandewalle, J., 2003. Hardware implementation of elliptic curve processor over GF(p). In Proceedings of the Application-Specific Systems, Architectures, and Processors (ASAP), 433-443.
-
(2003)
Proceedings of the Application-Specific Systems, Architectures, and Processors (ASAP
, pp. 433-443
-
-
Ors, S.1
Batina, L.2
Preneel, B.3
Vandewalle, J.4
-
17
-
-
84966238549
-
Monte Carlo methods for index computation mod p
-
Pollard, J., 1978. Monte Carlo methods for index computation mod p.Math. Comput. 32, 143, 918-924.
-
(1978)
Math. Comput.
, vol.32
, Issue.143
, pp. 918-924
-
-
Pollard, J.1
-
18
-
-
35248849882
-
Factoring large numbers with the TWIRL device
-
Lecture Notes in Computer Science, Springer
-
Shamir, A., Tromer, E., 2003. Factoring large numbers with the TWIRL device. In Advances in Cryptology-(Crypto'03). Lecture Notes in Computer Science, vol. 2729. Springer, 1-26.
-
(2003)
Advances in Cryptology-(Crypto'03)
, vol.2729
, pp. 1-26
-
-
Shamir, A.1
Tromer, E.2
-
19
-
-
84947761194
-
Speeding up Pollard's rho method for computing discrete logarithms
-
Teske, E., 1998. Speeding up Pollard's rho method for computing discrete logarithms.Algorithmic Number Theory Seminar (ANTS-III), 541-554.
-
(1998)
Algorithmic Number Theory Seminar (ANTS-III
, pp. 541-554
-
-
Teske, E.1
-
20
-
-
17444376558
-
Parallel collision search with cryptanalytic applications
-
Oorschot Van, P., Wiener, M., 1999. Parallel collision search with cryptanalytic applications.J. Cryptol. 12, 1-28.
-
(1999)
J. Cryptol.
, vol.12
, pp. 1-28
-
-
Oorschot Van, P.1
Wiener, M.2
|