[1]“Advanced Encryption Standard (AES)”, Federal Information Processing Standards (FIPS) Publication 197, Nov. 26, 2001.
[2]G. B. Agnew, R. C. Mullin, and S. A. Vastone, “An Implementation of Elliptic Curve Cryptosystems over ”,IEEE Journal on Selection Area in Communication, vol. 11, no. 5, 1993, pp. 804-813.
[3]L. Adleman, R. L. Rivest, and A. Shamir “A Method for Obtaining Digital Signature and Public-key Cryptosystems”, Communications of The ACM, vol. 21, no. 2, 1978, pp. 120-126.
[4]L. Batina, M. Mentens, B. Preneel, and I. Verbauwhede, “Algorithms and Architectures for Elliptic Curve Cryptogrphy over ” Proceedings of ASAP’05.
[5]Certicom corporation, “tutorial of elliptic curve,” http://www.certicom.com/
[6]R. C. C. Chenung, P. Y. K. Cheung, W. Luk, and N. J. B. Telle, “Customizable Elliptic Curve Cryptosystems” IEEE Trans. On VLSI Systems, vol. 13. No ,9, Sep. 2005, pp. 1048 –1059.
[7] “Data Encryption Standard (DES)”, Federal Information Processing Standards (FIPS) 46, National Bureau of Standards(U.S.), Jan. 1979.
[8]L. Decutsch, J. Omura and I. Reed, T. Truong, H. Shao, and C. Wang, “VLSI architectures for computing multiplications and inverses in ,” IEEE Trans. on Computers, Aug 1985, pp. 709-716.
[9]R. Effendi, A. Surya, and S. Sutikno, “An Implementation of ElGamal Ellptic Cures Cryptosystems” IEEE APCCAS 1998, 1998, pp. 483-486.
[10]M. Ernst, S. A. Huss, S. Kiupsch, and O. Hauck, “Rapid Prototyping for Hardware Accelerated Elliptic Curve Public-Key Cryptosytsems” Proc. 12th International Work-shop Rapid System Prototyping (RSP), Jun. 2001, pp. 24-29.
[11]A. Hassan and J. Lutz, “High Performance FPGA based Elliptic Curve Cryptographic Co-Processor” Proceedings of ITCC’04.
[12]J. T. Hwang, Y. C. Kim, and J. Park, “FPGA and ASIC Implementation of ECC Processor for Security on Medical Embedded System” Proceedings of ICITA’05.
[13]T. Itoh, O. Teechai, and S. Tsujii,, “A fast algorithm for computing multiplicative inverses in using normal bases” J. Society for Electronic Communications (Japan), vol. 44, 1986, pp. 31-36.
[14]N. Koblitz, “Elliptic Curve Cryptosystems”, Mathematics of Computation, vol. 48, 1987, pp. 203-209.
[15]P. H.W Leong, K. H. Leung, K.W. Ma, W. K. Ma, and W. K. Wong, “FPGA Implementation of a Microcoded Elliptic Curve Cryptographic Processor” IEEE Symp. Field Programmable Custom Computing Machines , Apr. 2000, pp. 68-76.
[16]J. Massey and J. Omura, “U.S. patent 4,587,627”, May 1986.
[17]R. Mullin, I. Onyszchuk, S. Vanstone and R. Wilson, “Optimal normal bases in ”, Discrete Applied Mathematics, vol. 22, 1988/89, pp. 149-161.
[18]William Stallings, “Cryptography and Network Security”, pp. 261.
[19]張銘哲, “適用於可攜式裝置之橢圓曲線密碼系統晶片設計”, 國立海洋大學電機工程碩士論文, 民國92年.[20]林三煬, “雙場橢圓曲線加密處理器”, 國立清華大學電機工程碩士論文, 民國93年.[21]沈秋泯, “橢圓曲線加解密晶片之設計與分析”, 國立海洋大學電機工程碩士論文, 民國90年.