|
[1] Y. H. Hsieh, “Design and implementation of an RSA encryption/decryption processor on IC smart card,” Master's Thesis, National Taiwan University, Taiwan, June 1999. [2] W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Trans. Information Theory, vol. 22, pp. 644—654, Nov. 1976. [3] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystem,” Communications of the ACM, vol. 21, pp. 120—126, Feb. 1978. [4] E. F. Brickell, “A survey of hardware implementations of rsa,” in Advances in Cryptology, Proc. CRYPTO’89, (Berlin), pp. 368—370, 1989. [5] P. L. Montgomery, “Modular multiplication without trial division,” Mathematics of Computation, vol. 44, pp. 519—521, Apr. 1985. [6] P. S. Chen, “VLSI implementation for a systolic RSA public key cryptosystem,” Master's Thesis, National Tsing-Hua University, Taiwan, June 1995. [7] C.-C. Yang, T.-S. Chang, and C.-W. Jen, “A new RSA cryptosystem hardware design based on Montgomery's algorithm,” IEEE Trans. Circuits and Systems II: Analog and Digital Signal Processing, vol. 45, pp. 908—913, July 1998. [8] C. D. Walter, “Systolic modular multiplication,” IEEE Trans. Computers, vol. 42, pp. 376—378, Mar. 1993. [9] J.-H. Hong, “RSA public key crypto-processor core design and hierarchical system test using IEEE 1149 family,” Phd Thesis, National Tsing-Hua University, Taiwan, June 2000. [10] I. Niven, H. S. Zuckerman, and H. L. Montgomery, An Introduction to the Theory of Numbers. John Wiley & Sons, 1991. [11] M. Shand and J. Vuillemin, “Fast implementation of RSA cryptography,” in Proc. 11th IEEE Symp. Computer Arithmetic, (Windsor, Ontario), pp. 252—259, June 1993. [12] C. K. Koc, “RSA hardware implementation,” Technical Report, No.2, RSA Laboratories, RSA Data Security, Inc., Redwood City, CA, 1995.
|