메뉴 건너뛰기




Volumn 473 LNCS, Issue , 1991, Pages 230-244

A cryptographic library for the Motorola DSP56000

Author keywords

Data Encryption Standard (DES); Encryption hardware; Message digest; Modular arithmetic; Montgomery reduction; Motorola DSP56000; Multiple precision arithmetic; RSA

Indexed keywords

HARDWARE;

EID: 85034490362     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-46877-3_21     Document Type: Conference Paper
Times cited : (110)

References (30)
  • 1
    • 85034497704 scopus 로고
    • Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor
    • In A.M. Odlyzko. editor, volume 263 of Lecture Nores in Computer Science, Springer-Verlag
    • Paul Banett. Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor. In A.M. Odlyzko. editor, Advances in Cryptology - CRYPT0 '86 Proceedings, volume 263 of Lecture Nores in Computer Science, pages 311-323. Springer-Verlag, 1987.
    • (1987) Advances in Cryptology - CRYPT0 '86 Proceedings , pp. 311-323
    • Banett, P.1
  • 2
    • 0002555945 scopus 로고
    • Differential analysis of DES-like crypmystems preprint)
    • Santa Barbara, CA, August 12-15, to appear
    • Eli Biham and Adi Shamir. Differential analysis of DES-like crypmystems preprint). Proceedings of CRYPT0 '90 (Santa Barbara, CA, August 12-15,1990), to appear.
    • (1990) Proceedings of CRYPT0 '90
    • Biham, E.1    Shamir, A.2
  • 3
    • 0000742754 scopus 로고
    • Addition chain heuristics
    • In G. Brassard, editor, volume 435 of Lecture Nola in Computer Science, Springer-Verlag
    • Jujen Bos and Matthijs Costa. Addition chain heuristics. In G. Brassard, editor, Advances in Cryptology - CRYPTO '89 Proceedings, volume 435 of Lecture Nola in Computer Science, pages 400-407. Springer-Verlag. 1990.
    • (1990) Advances in Cryptology - CRYPTO '89 Proceedings , pp. 400-407
    • Bos, J.1    Costa, M.2
  • 4
    • 0038462781 scopus 로고
    • A survey of hardware implementations of RSA
    • In G. Brassard. editor, volume 435 of Lecture Notes in Computer Science, Springer-Verlag
    • Emest F. Brickell. A survey of hardware implementations of RSA. In G. Brassard. editor, Advances in Ctyptology - CRYPTO '89 Proceedings, volume 435 of Lecture Notes in Computer Science, pages 368-370. Springer-Verlag, 1990.
    • (1990) Advances in Ctyptology - CRYPTO '89 Proceedings , pp. 368-370
    • Brickell, E.F.1
  • 5
    • 1542585296 scopus 로고
    • A midtiprecise integer arithmetic package
    • Duncan A. Buell and Robert L. Ward. A midtiprecise integer arithmetic package. The Journal of Supercomputing, 3:89-107.1989.
    • (1989) The Journal of Supercomputing , vol.3 , pp. 89-107
    • Buell, D.A.1    Ward, R.L.2
  • 6
    • 0003928877 scopus 로고
    • Federal Information Processing Standards Publication 113. National Bureau of Standards, U.S. Department of Commerce
    • Computer data authentication. Federal Information Processing Standards Publication 113. National Bureau of Standards, U.S. Department of Commerce, 1985.
    • (1985) Computer data authentication
  • 7
    • 0003508568 scopus 로고
    • Federal Information Processing Standards Publication 46-1, National Bureau of Standards, U.S. Depamnent of Commerce
    • Data encryption standard. Federal Information Processing Standards Publication 46-1, National Bureau of Standards, U.S. Depamnent of Commerce, 1977.
    • (1977) Data encryption standard
  • 10
    • 35248869223 scopus 로고
    • Efficient hardware and software implementations for the DES
    • In G R Blakley and D. Chaum. editors, volume 196 of Lecture Notes in Computer Science, Springer-Verlag
    • Marc Davio, Yvo Desmedt, Jo Goubert, Frank Hwrnaert and Jean-Jacques Quisuater. Efficient hardware and software implementations for the DES. In G R Blakley and D. Chaum. editors, Advances in Cryprology: Proceedings of CRYPTO 84, volume 196 of Lecture Notes in Computer Science. pages 144-146. Springer-Verlag, 1985.
    • (1985) Advances in Cryprology: Proceedings of CRYPTO 84 , pp. 144-146
    • Davio, M.1    Desmedt, Y.2    Goubert, J.3    Hwrnaert, F.4    Quisuater, J.-J.5
  • 11
    • 0004246335 scopus 로고
    • Federal Information Processing Standards Publication 81, National Bureau of Standards, U.S. Department of Commerce
    • DES modes of operation. Federal Information Processing Standards Publication 81, National Bureau of Standards, U.S. Department of Commerce, 1980.
    • (1980) DES modes of operation
  • 16
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, IT-31:469-472,1985.
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , pp. 469-472
    • ElGamal, T.1
  • 17
    • 0003532271 scopus 로고
    • UNM password security - Ten years later
    • In G. BrasSarp editor, volume 435 of Lecture Noles in Computer Science, Springer-Verlag
    • David C. Feldmeier and Philip R. Karn. UNM password security - ten years later. In G. BrasSarp editor, Advances in Cryprology - CRYPTO '89 Proceedings. volume 435 of Lecture Noles in Computer Science, pages 44-63. Springer-Verlag, 1990.
    • (1990) Advances in Cryprology - CRYPTO '89 Proceedings , pp. 44-63
    • Feldmeier, D.C.1    Karn, P.R.2
  • 18
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • In A.M. Odlyzko, editor, volume 263 ofkcture Notes in Compuer Science, Springer-Verlag
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In A.M. Odlyzko, editor. Advances in Cryptology - CRYPTO '86 Proceedings, volume 263 ofkcture Notes in Compuer Science, pages 186-194. Springer-Verlag, 1987.
    • (1987) Advances in Cryptology - CRYPTO '86 Proceedings , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 19
    • 84959165880 scopus 로고
    • A practical zero-knowledge protocol fitted-to security microprocessor minimizing both transmission and memory
    • In C.G. Gunther, editor, volume 330 of kclure Notes in Computer Science, Springer-Verlag
    • L.S. Guillou and I.-I. Ququater. A practical zero-knowledge protocol fitted-to security microprocessor minimizing both transmission and memory. In C.G. Gunther, editor, Advances in Cryptology - EUROCRYPT '88 Proceedings, volume 330 of kclure Notes in Computer Science, pages 123-128. Springer-Verlag. 1988.
    • (1988) Advances in Cryptology - EUROCRYPT '88 Proceedings , pp. 123-128
    • Guillou, L.S.1    Ququater, I.-I.2
  • 21
    • 85043792604 scopus 로고
    • Rapport Laas No. 90052, Labomtoire d’Automatique et D’Analyse des Systemes
    • Denis Laurichesse. Mise en oeuvre optimisee du chifie RSA. Rapport Laas No. 90052, Labomtoire d’Automatique et D’Analyse des Systemes, 1990.
    • (1990) Mise en oeuvre optimisee du chifie RSA
    • Laurichesse, D.1
  • 23
    • 84966243285 scopus 로고
    • Modular multiplication without trial division
    • Peter L. Montgomery. Modular multiplication without trial division. Mathematics of Computation. 44(170):519-521, 1985.
    • (1985) Mathematics of Computation , vol.44 , Issue.170 , pp. 519-521
    • Montgomery, P.L.1
  • 24
    • 0020194569 scopus 로고
    • Fast decipherment algorithms for RSA public-key cryptosystem
    • J.-J. Quisquater and C. Couvreur. Fast decipherment algorithms for RSA public-key cryptosystem. Electronics Letters, 18(21):905-907. 1982.
    • (1982) Electronics Letters , vol.18 , Issue.21 , pp. 905-907
    • Quisquater, J.-J.1    Couvreur, C.2
  • 25
    • 85043777614 scopus 로고
    • The MD4 message digest algorithm (preprint)
    • Santa Barbara, CA, August 12-15, to appear
    • Ronald L. Rivest. The MD4 message digest algorithm (preprint). Proceedings of CRYPT0 '90 (Santa Barbara, CA, August 12-15,1990), to appear.
    • (1990) Proceedings of CRYPT0 '90
    • Rivest, R.L.1
  • 26
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Ronald L. Rivest, Adi Shamir and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126.1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 27
    • 0024656331 scopus 로고
    • Algorithms for software implementations of RSA
    • A. Selby and C. Mitchell. Algorithms for software implementations of RSA. IEE Proceedings, 136 part E(3): 166-170,1989.
    • (1989) IEE Proceedings , vol.136 , Issue.3 , pp. 166-170
    • Selby, A.1    Mitchell, C.2
  • 28
    • 84947654918 scopus 로고
    • General-purpase digital signal processors
    • Michael K. Stauffer and Michael Slater. General-purpase digital signal processors. Microprocessor Report, 3(10):25-29,1989.
    • (1989) Microprocessor Report , vol.3 , Issue.10 , pp. 25-29
    • Stauffer, M.K.1    Slater, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.