|
[1] W. Diffie and M. E. Hellman, ”New Directions in Cryptography,” IEEE Trans. Information Theory, vol. 22, pp. 644-654, June 1976. [2] IEEE, IEEE 1363 Standard Specifications for Public-Key Cryptography, IEEE Standards Department, Piscataway, Jan. 2000. [3] RSA Laboratories, PKCS #1 v2.1: RSA Cryptography Standard, RSA Laboratories, Bedford, June 2002. [4] N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, ”Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs,” in Cryptographic Hardware and Embedded Systems (CHES) 2004, Aug. 2004, vol. 3156 of LNCS, pp. 119-132, Springer-Verlag. [5] A. Cilardo, L. Coppolino, N. Mazzocca, and L. Romano, ”Elliptic Curve Cryptography Engineering,” Proceedings of the IEEE, vol. 94, no. 2, pp. 395-406, Feb. 2006. [6] H.Wu, ”Bit-Parallel Finite Field Multiplier and Squarer Using Polynomial Basis,” IEEE Trans. Computers, vol. 51, no. 7, pp. 750-758, July 2002. [7] K. Sakiyama, L. Batina, B. Preneel, and I. Verbauwhede, ” Multicore Curve-based Cryptoprocessor with Reconfiguarable Modular Arithmetic Logic Units over GF(2^n),” IEEE Trans. Computers, vol. 56, no. 9, pp. 1269-1282, 2007. [8] J. L´opez and R. Dahab, ”Improved Algorithms for Elliptic Curve Arithmetic in GF(2m),” in Selected Areas in Cryptography: 5th Annual International Workshop (SAC) 1998, Aug. 1998, vol. 1556 of LNCS, pp. 201-212, Springer-Verlag. [9] J. L´opez and R. Dahab, ”Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation,” in Cryptographic Hardware and Embedded Systems (CHES) 1999, Aug. 1999, vol. 1717 of LNCS, pp. 316-327, Springer-Verlag. [10] M. Ernst, M. Jung, F. Madlener, S. Huss, and R. Bl¨umel,” A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2n),” in Cryptographic Hardware and Embedded Systems (CHES) 2002, Aug. 2002, vol. 2523 of LNCS, pp. 175-192, Springer-Verlag. [11] N. Gura, S. C. Shantz, H. Eberle, S. Gupta, V. Gupta, D. Finchelstein, E. Goupy, and D. Stebila, ”An End-to-End Systems Approach to Elliptic Curve Cryptography,” in Cryptographic Hardware and Embedded Systems (CHES) 2002, Aug. 2002, vol. 2523 of LNCS, pp.349-365, Springer-Verlag. [12] A. Satoh and K. Takano, ”A Scalable Dual-Field Elliptic Curve Cryptographic Processor,” IEEE Trans. Computers, vol. 52, no. 4, pp. 449-460, Apr. 2003. [13] J. Lutz and A. Hasan, ”High Performance FPGA based Elliptic Curve Cryptographic Co-Processor,” in Proc. IEEE Int’l Conf. on Information Technology: Coding and Computing (ITCC), Los Vegas, Apr. 2004, vol. 2, pp. 486-492. [14] S. M. H. Rodr´ıguez and F. Rodr´ıguez-Henr´ıquez, ”An FPGA Arithmetic Logic Unit for Computing Scalar Multiplication using the Half-and-Add Method,” in Proc. IEEE Int’l Conf. Reconfigurable Computing and FPGAs (ReConFig), Puebia, Sept. 2005. [15] R. C. C. Cheung, N. J.-B. Telle, W. Luk, and P. Y. K. Cheung, ”Customizable Elliptic Curve Cryptosystems,” IEEE Trans. VLSI Systems, vol. 13, no. 9, pp. 1048-1059, Sept. 2005. [16] K. Sakiyama, E. De Mulder, B. Preneel, and I. Verbauwhede, ”A Parallel Processing Hardware Architecture for Elliptic Curve Cryptosystems,” in Proc. IEEE Int’l Conf. Acoustics, Speech and Signal Processing (ICASSP), Toulouse, May 2006, vol. 3, pp. 904-907. [17] B. Ansari and M. A. Hasan, ”High-Performance Architecture of Elliptic Curve Scalar Multiplication,” IEEE Trans. Computers, vol. 57, no. 11, pp. 1143-1153, Nov. 2008. [18] K. J¨arvinen and J. Skytt¨a, ”On Parallelization of High-Speed Processors for Elliptic Curve Cryptography,” IEEE Trans. VLSI Systems, vol. 16, no. 9, pp. 1162-1175, Sept. 2008. [19] T. G¨uneysu and C. Paar, ”Ultra High Performance ECC over NIST Primes on Commercial FPGAs,” in Cryptographic Hardware and Embedded Systems (CHES) 2008, vol. 5154 of LNCS, pp. 62-78, Springer-Verlag. [20] F. Sozzani, G. Bertoni, S. Turcato, and L. Breveglieri, ”A Parallelized Design for an Elliptic Curve Cryptosystem Coprocessor,” in Proc. IEEE Int’l Conf. on Information Technology: Coding and Computing (ITCC), Los Vegas, Apr. 2005, pp. 626-630. [21] H. M. Choi, C. P. Hong, and C. H. Kim, ”High Performance Elliptic Curve Cryptographic Processor over GF(2^163),” in Proc. IEEE Int. Symposium on Electronic Design, Test, and Applications (DELTA), Hong Kong, Jan. 2008, pp. 290-295. [22] F. R. Henr´ıquez, N. A. Saqib, and A. D. P´erez, ”A Fast Parallel Implementation of Elliptic Curve Point Multiplication Over GF(2m),” in Microprocessors and Microsystems, Aug. 2004, vol. 28, pp. 329-339. [23] N. A. Saqib, F. R. Henriquez, and A. D. P´erez, ”A Parallel Architecture for Fast Computation of Elliptic Curve Scalar Multiplication over GF(2m),” in International Parallel and Distributed Processing Symposium (IPDPS), Apr. 2004, p. 144. [24] H. Eberle, N. Gura, and S. C. Shantz, ”A Cryptographic Processor for Arbitrary Elliptic Curves over GF(2^m),” in Application-specific Systems, Architectures and Processors, 2003, ASAP’03, IEEE International Conf., 2003, p. 444. [25] C. Shu, K. Gaj, and T. El-Ghazawi, ”Low Latency Elliptic Cure Cryptography Accelerators for NIST Curves over Binary Fields,” in IEEE Field-Programmable Technology (FPT), 2005, pp. 309-310. [26] W. N. Chelton and M. Benaissa, ”Fast Elliptic Curve Cryptography on FPGA,” IEEE Trans. VLSI Systems, vol. 16, no. 2, Feb. 2008. [27] K. J¨arvinen and J. Skytt¨a, ”Fast Point Multiplication on Koblitz Cruves: Parallelization Method and Implementations,” Microprocessors and Microsystems, vol. 33, pp. 106-116, Mar. 2009. [28] X. Wang and Y. Zhang, ”A Pseudo-pipelined VLSI Architecture of Two Elliptic Curve Scalar Multiplications,” in IEEE Int. Conf. of Electron Devices and Solid-State Circuits, Jan. 2009, pp. 258-261. [29] W. Mehuron and R. G. Kammer, Digital Signature Standard, National Institute of Standards and Technology (NIST), Gaithersburg, Jan. 2000. [30] S. Kim, M. Yung, and H. W. Lee, ”A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor,” in International Workshop on Information Security Application, Berlin, 2007, vol. 4867 of LNCS, pp. 115-127, Springer-Verlag. [31] Y. K. Lee, K. Sakiyama, L. Batina, and I. Verbauwhede, ”Elliptic-Curve-Based Security Processor for RFID,” IEEE Trans. Computers, vol. 57, no. 11, pp. 1514-1527, Nov. 2008. [32] L. Batina, N. Mentens, K. Sakiyama, B. Preneel, and I. Verbauwhede, ”Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks,” in Annual European Symposium on Algorithms. 2006, vol. 4357 of LNCS, pp. 6-17, Springer-Verlag. [33] D. Hankerson, A. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography, Springer, Jan. 2003. [34] T. Itoh and S. Tsujii, ”A Fast Algorithm for Computing Multiplicative Inverses in GF(2^m) Using Normal Bases,” Information and Computation, vol. 78, no. 3, pp. 171-177, Sept. 1988.
|