|
[1]W. Stallings, Cryptography and Network Security: Principles and Practice, 1999. [2]A. Hodjat, D. D. Hwang, I. Verbauwhede “A scalable and high performance elliptic curve processor with resistance to timing attacks,” ITCC. vol. 1, pp. 538 – 543, April 2005. [3]IEEE P1363/D13, Standard Specification for Public-key Cryptography, November 1999. [4]Certicom Research, Standard for Efficient Cryptography SEC1: Elliptic Curve Cryptography, Certicom corp., 2000. [5]A. Satoh and K. Takan, “A Scalable Dual-Field Elliptic Curve Cryptographic Processor,” IEEE Transactions on Computers, vol 52, pp. 449 – 460, April 2003. [6]J. Lopez and R. Dahab, “Improved Algorithms for Elliptic Curve Arithmetic in GF(2n),” Lecture Notes In Computer Science, vol. 1556, pp. 201 – 212, 1998. [7]N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, vol. 48, pp. 203-209, 1987. [8]V. Miller, “Uses of elliptic curves in cryptography,” Advances in Cryptology -- CRYPTO '85, Lecture Notes in Computer Science, pp. 417-426, 1986. [9]N. Koblitz., A Course in Number Theory and Cryptography, Springer-Verlag, New York, 1994.
|