-
1
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Comm. ACM, vol. 21, pp. 120–126, 1978.
-
(1978)
Comm. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
2
-
-
0000112683
-
Elleptic Curve Cryptosystems
-
N. Koblitz “Elleptic Curve Cryptosystems,” Math. Computation, vol. 48, pp. 203–209, 1987.
-
(1987)
Math. Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
3
-
-
33749376484
-
Hardware Elliptic Curve Cryptographic Processor over rmGF(p)
-
Sept.
-
C. McIvor, M. McLoone, and J. McCanny, “Hardware Elliptic Curve Cryptographic Processor over rmGF(p),” IEEE Trans. Circuits and Systems (ITCAS), vol. 53, no. 9, pp. 1946–1957, Sept. 2006.
-
(2006)
IEEE Trans. Circuits and Systems (ITCAS)
, vol.53
, Issue.9
, pp. 1946-1957
-
-
McIvor, C.1
McLoone, M.2
McCanny, J.3
-
4
-
-
0034428671
-
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
-
M. Hani, T. Lin, and N. Shaikh-Husin, “FPGA Implementation of RSA Public-Key Cryptographic Coprocessor,” Proc. TENCON, pp. 6–11, 2000.
-
(2000)
Proc. TENCON
, pp. 6-11
-
-
Hani, M.1
Lin, T.2
Shaikh-Husin, N.3
-
7
-
-
0003777826
-
A Public Key Cryptosystem Based on Algebraic Coding Theory
-
DSN Progress Report 42–44
-
R.J. McEliece, “A Public Key Cryptosystem Based on Algebraic Coding Theory,” DSN Progress Report 42–44, pp. 114–116, 1978.
-
(1978)
, pp. 114-116
-
-
McEliece, R.J.1
-
8
-
-
34250244723
-
Factoring Polynomials with Rational Coefficients
-
A. Lenstra, H.W. Lenstra, and L. Lovasz “Factoring Polynomials with Rational Coefficients,” Annals of Math., vol. 261, pp. 515–534, 1982.
-
(1982)
Annals of Math.
, vol.261
, pp. 515-534
-
-
Lenstra, A.1
Lenstra, H.W.2
Lovasz, L.3
-
9
-
-
71049170879
-
Analysis of a Public Key Approach Based on Polynomial Substitution
-
Springer
-
H. Fell and W. Diffie, “Analysis of a Public Key Approach Based on Polynomial Substitution,” Advances in Cryptology-CRYPTO'85, Springer, 1986.
-
(1986)
Advances in Cryptology-CRYPTO'85
-
-
Fell, H.1
Diffie, W.2
-
10
-
-
62349136105
-
A Novel Rekeying Message Authentication Procedure Based on Winternitz OTS and Reconfigurable Hardware Architectures
-
(ReConFig '08)
-
A. Shoufan, O. Kelm, and S. Schipp, “A Novel Rekeying Message Authentication Procedure Based on Winternitz OTS and Reconfigurable Hardware Architectures,” Proc. Int'l Conf. Reconfigurable Computing and FPGAs (ReConFig '08), 2008.
-
(2008)
Proc. Int'l Conf. Reconfigurable Computing and FPGAs
-
-
Shoufan, A.1
Kelm, O.2
Schipp, S.3
-
12
-
-
62349135121
-
High Performance Implementation of a Public Key Block Cipher—MQQ, for FPGA Platforms
-
M. El-Hadedy, D. Gligoroski, and S.J. Knapskog, “High Performance Implementation of a Public Key Block Cipher—MQQ, for FPGA Platforms,” Proc. Int'l Conf. Reconfigurable Computing and FPGAs (ReConFig '08), 2008.
-
(2008)
Proc. Int'l Conf. Reconfigurable Computing and FPGAs (ReConFig '08)
-
-
El-Hadedy, M.1
Gligoroski, D.2
Knapskog, S.J.3
-
13
-
-
71049146820
-
FPGA Implementation of a Recently Published Signature Scheme
-
J.-C. Beuchat, N. Sendrier, A. Tisserand, and G. Villard, “FPGA Implementation of a Recently Published Signature Scheme,” Rapport de Recherche RR LIP 2004–14, 2004.
-
(2004)
Rapport de Recherche RR LIP 2004–14
-
-
Beuchat, J.-C.1
Sendrier, N.2
Tisserand, A.3
Villard, G.4
-
16
-
-
0001618196
-
A New Class of Linear Correcting Codes
-
V.D. Goppa “A New Class of Linear Correcting Codes,” Problems of Information Transmission, vol. 6, pp. 207–212, 1970.
-
(1970)
Problems of Information Transmission
, vol.6
, pp. 207-212
-
-
Goppa, V.D.1
-
18
-
-
56749164782
-
Attacking and Defending the McEliece Cryptosystem
-
Springer
-
D.J. Bernstein, T. Lange, and C. Peters, “Attacking and Defending the McEliece Cryptosystem,” Post-Quantum Cryptography, pp. 31–46, Springer, 2008.
-
(2008)
Post-Quantum Cryptography
, pp. 31-46
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
19
-
-
84858691417
-
A Summary of McEliece-Type Cryptosystems and Their Security
-
D. Engelbert, R. Overbeck, and A. Schmidt, “A Summary of McEliece-Type Cryptosystems and Their Security,” Math. Cryptology, vol. 1, pp. 151–191, 2007.
-
(2007)
Math. Cryptology
, vol.1
, pp. 151-191
-
-
Engelbert, D.1
Overbeck, R.2
Schmidt, A.3
-
21
-
-
84937393537
-
Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC
-
Springer
-
K. Kobara and H. Imai, “Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC,” Lecture Notes in Computer Science, pp. 19–35, Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, pp. 19-35
-
-
Kobara, K.1
Imai, H.2
-
22
-
-
0016487667
-
Algebraic Decoding of Goppa Codes
-
Mar.
-
N. Patterson “Algebraic Decoding of Goppa Codes,” IEEE Trans. Information Theory, vol. 21, no. 2, pp. 203–207, Mar. 1975.
-
(1975)
IEEE Trans. Information Theory
, vol.21
, Issue.2
, pp. 203-207
-
-
Patterson, N.1
-
24
-
-
0024733862
-
Systolic Gaussian Elimination over GF(p) with Partial Pivoting
-
Sept.
-
B. Hochet, P. Quinton, and Y. Robert “Systolic Gaussian Elimination over GF(p) with Partial Pivoting,” IEEE Trans. Computers, vol. 38, no. 9, pp. 1321–1324, Sept. 1989.
-
(1989)
IEEE Trans. Computers
, vol.38
, Issue.9
, pp. 1321-1324
-
-
Hochet, B.1
Quinton, P.2
Robert, Y.3
-
28
-
-
85008553313
-
-
http://www.alpha-data.com
-
“Alpha-Data,” http://www.alpha-data.com, 2010.
-
(2010)
Alpha-Data
-
-
-
29
-
-
85008532562
-
-
http://www.xilinx.com
-
“Xilinx,” http://www.xilinx.com, 2010.
-
(2010)
Xilinx
-
-
-
30
-
-
84928784339
-
MicroEliece: McEliece for Embedded Devices
-
T. Eisenbarth, T. Güneysu, S. Heyse, and C. Paar, “MicroEliece: McEliece for Embedded Devices,” Proc. Workshop Cryptographic Hardware and Embedded Systems(CHES'09), 2009.
-
(2009)
Proc. Workshop Cryptographic Hardware and Embedded Systems(CHES'09)
-
-
Eisenbarth, T.1
Güneysu, T.2
Heyse, S.3
Paar, C.4
|