|
[1] R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems”, Commun, ACM, 1978, 21, pp. 120-126. [2] HUI, L. C. K. and LAM, K. Y., “Fast square-and-multiply exponentiation for RSA”, Electron Lett., 1994, Vol. 31, No. 17, pp. 1396 -1397. [3]賴溪松, 韓亮和張真誠, “近代密碼學及其應用”, 松崗, 1998.11, 二版. [4] P. L. Montgomery, “Modular multiplication without trial division”, Math. Comp., Apr. 1985, Vol.44, No.170, pp.519- 521. [5] C. D. Walter, “Montgomery exponentiation needs no final subtractions”, Electronics Letters, 14th October 1999, Vol. 35, No. 21. [6] Jyh-Huei Guo, Chin-Liang Wang, and Hung-Chih Hu, “Design and Implementation of an RSA Public-Key Cryptosystem”, IEEE, 1999, I-504. [7] Y. Yacobi, “Exponentiating Faster with Addition Chains,” Advances in Eurocypt’90, New York, Springer-Verlag, 1990, pp. 222-229. [8] S. C. Pohlig and M. E. Hellman, “An Improved for Computing Logarithms in GF(p) and Its Cryptographic Significance“, IEEE Transactions on Information Theory, Vol. 24, No. 1, pp. 106-111, Jan. 1978. [9] YEN. S. M. and LAIH. C. S., “Common-multiplicand multiplication and its applications to public key cryptography”, Electron Lett., 1993, Vol. 29, No. 17, pp. 1583-1584. [10] C. W. Chiou, “Parallel Implementation of the RSA Public- key Cryptosystem”, International Journal of Computer Mathematics, 1993, Vol. 48, pp. 153-155. [11] CHEN. C. Y., CHANG. C. C. and YANG. W. P. “Hybrid method for modular exponentiation with precomputation”, Electron Lett., 14th March 1996, Vol. 32, No. 6, pp. 540-541. [12] C. C. Yang, T. S. Chang and C.W. Jen, “A new RSA cryptosystem hardware design based on Montgomery’s algorithm”, IEEE Trans. Circuits and Systems, July 1998, vol. CAS-45, pp. 908-913. [13] 楊吳泉, “現代密碼學入門與程式設計”, 全華, 1998.11, 初版. [14] C. C. Lin, J. H. Jeng, Member IEEE and T. K. Truong, Fellow IEEE, “Fast exponentiation for RSA Cipher”, 17th Workshop on Combinatorial Mathematics Computation Theory, Apr. 2000, pp. 146-149.
|