|
[1]R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, Vol.21, No.2, pp.120-126, Feb.1978. [2]R. Lidl, H. Niederreiter,” Introduction to Finite Fields and Their Applications”, New York: Cambridge Univ. Press, 1994. [3]N. Kobliz, “Elliptic Curve Cryptography,” Math. Computation, Vol.48, pp.203-209, 1987. [4]R. Schroeppel, H. Orman, S. O’Malley, and O. Spatscheck, “Fast key exchange with Elliptic Curve Systems,” Advances in Cryptology-CRYPTO 95, D. Coppersmith, ed., Berlin: Springer-Verlag, pp.43-56, 1995. [5]E. De Win, A. Bosselaers, S. Vandenberghe, P. De Gersem, and J. Vandewalle, “A fast software implementation for arithmetic operations in GF(2n),” Advances in Cryptology-ASIACRYPT’96, K. Kim and T. Matsumoto, eds., Berlin: Springer-Verlag, pp.65-76, 1996. [6]A. J. Menezes, “Elliptic Curve Public Key Cryptosystems”, Boston, MA: Kluwer Academic Publishers, 1993. [7]F. Fekri, M.Sartipi, R.M.Mersereau, R.W.Schafer, “Convolutional codes using finite-field wavelets: time-varying codes and more,” IEEE Trans. Signal Processing, Vol.53, Issue 5, pp.1881–1896, May 2005. [8]F. J. MacWilliams and N. J. A. Sloane, “The Theory of Error-Correcting Codes,” Amsterdam: North-Holland, 1977. [9]S. Gallacher, P. S. Gallacher, “Different Channel Coding Strategies for OFDM-CDMA,” Proc. of 1997 IEEE 47th Vehicular Technology Conference, Vol. 2, 4-7, pp.845-849, May 1997. [10]http://csrc.nist.gov/CryptoToolkit/aes/ [11]E. R. Berlekamp, “Bit-serial Reed-Solomon encoders,” IEEE Trans. Inf. Theory, Vol. IT-28, pp.869-874, 1982. [12]C. Y. Lee, “Low complexity bit-parallel systolic multiplier over GF(2m) using irreducible trinomials,” IEE Proc.-Comput. Digit. Tech., Vol.150, No.1, pp.39-42, Jan. 2003. [13]C. Paar, “A new architecture for a parallel finite field multiplier with low complexity based on composite fields,” IEEE Trans. Computers, Vol.45, No.7, pp.856-861, July 1996. [14]C.W. Chiou, L.C. Lin, F.H. Chou, and S.F. Shu, “Low complexity finite field multiplier using irreducible trinomials,” Electronics Letters, Vol.39, No.24, pp.1709-1711, 27th Nov. 2003. [15]J. L. Massey, J. K. Omura, “Computational method and apparatus for finite field arithmetic,” U.S. Patent Number 4,587,627, May 1986. [16]A. Reyhani-Masoleh and M. A. Hasan, “A new construction of Massey-Omura parallel multiplier over GF(2m),” IEEE Trans. Computers, Vol.51, No.5, pp.511-520, May 2002. [17]H. Wu, M. A. Hasan, and I. F. Blake, “New low-complexity bit-parallel finite field multipliers using weakly dual bases,” IEEE Trans. Computers, Vol. 47, No.11, pp.1223-1234, November 1998. [18]張真誠,電腦密碼學與資訊安全,初版,松崗電腦圖書公司,民國78年。 [19]賴溪松,韓亮,張真誠,近代密碼學及其應用,初版,旗標出版股份有限公司,民國92年。 [20]F. Gerd, “The Proof of Fermat's Last Theorem by R. Taylor and A. Wiles,” Notices of the AMS, Vol.42, No.7, pp.743-746, July 1995. [21]W. Andrew, “Modular elliptic curves and Fermat's Last Theorem,” Annals of Mathematics, Vol.141, pp.443-551, 1995. [22]G. Seroussi, “Table of Low-Weight Binary Irreducible Polynomials,” HP Labs Technical Report HPL-98-135, August 1998.
|