|
[1] Whitfield Diffie and Martin E. Hellman, “New Direction in Cryptography,” IEEE Transaction on Information Theory, vol. IT-22, no. 6, pp. 644-654, 1976. [2] R. L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM, vol. 21, pp. 120-130, February 1978. [3] Brickell, “A First Modular Multiplication Algorithm with Application to Two Key Cryptography,” in Advance in Cryptology (Proceeding of CRYPTO ’82), pp. 51-60, Academic Press, 1983. [4] P. L. Montgomery, “Modular multiplication without trial division,” Math. Computation, vol. 44, pp. 519-521, 1985. [5] Koc and C. Y. Hung, “Bit-level Systolic Array for Modular Multiplication,” Journal of VLSI Signal Processing, vol. 3, pp. 215-223, 1991. [6] Stephen E. Eldridge and C. D. Walter, “Hardware Implementation of Montgomery’s Modular Multiplication Algorithm,” IEEE Transaction on Computers, vol. 42, no. 6, pp. 693-699, June 1993. [7] Colin D. Walter, “Systolic Modular Multiplication,” IEEE Trans. Computers, vol. 42, no. 3, March 1993. [8] Po-Song Chen, Shih-Arn Hwang, and Cheng-Wen Wu, “A Systolic RSA Public Key Cryptosystem,” in Proc. IEEE Int. Symp. Circuits and Systems (ISCAS), vol. 4, (Atlanta), pp. 408-411, May 1996. [9] Jin-Hua Hong and Chen-Wen Wu, “Radix-4 Modular Multiplication and Exponentiation Algorithms for the RSA Public-Key Cryptosystem,” in Proc. Asia and South Pacific Design Automation Conf. (ASP-DAC), (Yokohama), pp. 565 -570, 2000. [10] Jin-Hua Hong and Chen-Wen Wu, “RSA public key crypto-processor core design and hierarchical system test using IEEE 1149 family,” PhD Thesis, National Tsing-Hua University, Taiwan, June 2000. [11] Ching-Chao. Yang, Tian-Sheuan Chang, and Chein-Wei Jen, “A New RSA Cryptosystem Hardware Design Based on Montgomery’s Algorithm,” IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol. 45, no. 7, pp. 908-913, July 1998. [12] Fang Yingli, Gao Zhiqiang, “A New RSA Cryptosystem Hardware Implementation Based on High-Radix Montgomery’s Algorithm,” 4th International ASIC conf., pp. 348 -351, 2001. [13] Y.-H. Hsieh, “Design and Implementation of an RSA Encryption /Decryption Processor on IC Smart Card,” Master’s Thesis, National Taiwan University, Taiwan, June 1999. [14] Ming-Cheng Sun; Chih-Pin Su; Chih-Tsun Huang; Cheng-Wen Wu, ” Design of a scalable RSA and ECC crypto-processor,” Design Automation Conference, 2003. Proceedings of the ASP-DAC 2003. Asia and South Pacific 21-24 Jan. 2003 [15] Jin-Hua Hong, Bin-Yan Tsai, Liang-Te Lu, Shao-Hui Shieh, “A novel radix-4 bit-level modular multiplier for fast RSA cryptosystem,” Circuits and Systems, 2004. (ISCAS) '04. Proceedings of the 2004 International Symposium on Volume 2, 23-26 May 2004 [16] Chih-Pin Su, Chen-Hsing Wang; Kuo-Liang Cheng; Chih-Tsun Huang; Cheng-Wen Wu,"Design and test of a scalable security processor,"Design Automation Conference, 2005. Proceedings of the ASP-DAC 2005. Asia and South Pacific Volume 1, 18-21 Jan. 2005 [17] P. Ribenboim, “The New book of Prime Number Records,“ New York: Springer-Verlag, 1996. [18] B. Kaliski, and M. Robshaw, “The Secure Use of RSA,” CryptoBytes, Autumn 1995. [19] Michael J. Wiener, “Cryptanalysis of Short RSA Secret Exponents.” IEEE Transactions on Information Theory, vol. 36, 1990. [20] P. Kocher, “Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other System.” Proceedings, Crypto ’96, August 1996; published by Springer-Verlag. [21] Jye-Jong Leu, and An-Yeu Wu, “Design Methodology for Booth-Encoded Montgomery Module Design for RSA Cryptosystem,” in Proc. IEEE International Symposium on Circuit and Systems, vol. 5, pp. 357-360, 2000. [22] Jin-Hua. Hong, and Chen-Wen Wu, “Cellular-Array Modular Multiplier for Fast RSA Public-Key Crypto-system Based on Modified Booth’s Algorithm,” IEEE Transactions on VLSI Systems, vol. 11, no. 3, pp. 474-484, June 2003. [23] Chih-Yuang Su, Shih-Arn Hwang, Po-Song Chen, and Cheng-Wen Wu, “An Improved Montgomery’s Algorithm for High-Speed RSA Public-Key Cryptosystem,” IEEE Transactions on VLSI Systems, vol. 7, no. 2, pp. 280-284, June 1999. [24] S. Y. Kung, “VLSI Array Processors, Englewood Cliffs,” New Jersey: Prentice-Hall Inc., 1988. [25] Keshab K. Parhi, “VLSI Digital Signal Processing Systems,” John Wiley & Sons, INC. 1999 Chap. 7 pp. 189-192 [26] Cheng-Wen Wu, Peter R. Cappello, “Easily Testable Iterative Logic Arrays,” IEEE Transactions on Computers, vol. 39, no. 5, pp.640-652, May 1990. [27] Sandeep Bhatia, Alexander Albicki, “Testing of Iterative Logic Arrays,” IEEE Transactions on Circuits and Systems, vol. 1, pp.243-246, August 1990. [28] Tsu-Wei Ku, Mani Soma, “Minimal Overhead Modification of Iterative Logic Arrays for C-testability,” IEEE International Test Conference, pp.964-968, 1990. [29] Shyue-Kung Lu, Jen-Chuan Wang, Cheng-Wen Wu, “C-Testable Design Techniques for Iterative Logic Arrays,” IEEE Transactions on VLSI Systems, vol. 3, no. 1, pp.146-152, March 1995.
|