|
[1] W. Diffie and M.E. Hellman, “New directions in cryptography,” IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976. [2] IEEE Standard Specifications for Public-Key Cryptography, IEEE Std 1363-2000, Jan. 2000. [3] R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978. [4] T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inf. Theory, vol. 31, no. 4, pp. 469-472, 1985. [5] Proposed Federal Information Processing Standard for Digital Signature Standard (DSS), Federal Register, vol. 56, pp. 42980-42982, Aug. 1991. [6] Recommended Elliptic Curves for Government Use, NIST, Available: http://csrc.nist.gov/CryptoToolkit/dss/ecdsa/NISTReCur.pdf. [7] SEC 2: Recommended Elliptic Curve Domain Parameters, SECG, Available: www.secg.org/collateral/sec2_final.pdf [8] Information Technology – Security Techniques – Digital Signatures with Appendix – Part 3: Certificate Based-Mechanisms, ISO/IEC 14888-3, 1998. [9] Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), ANSI X9.38, 1999. [10] Information Technology – Security Techniques – Cryptographic Techniques Based on Elliptic Curves – Part 4: Digital signatures giving message recovery, ISO/IEC 15946-4, 2004. [11] Public Key Cryptography for the Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography. Working Draft, ANSIX9.63-2001, May, 2001. [12] Certicom Corporation, The Basics of ECC 2006 [Online], Available: http://www.certicom.com/index.php?action=res,ecc_faq. [13] Digital Signature Standard, NIST, FIPS Publication 186-2, Feb. 2000. [14] P.L. Montgomery, “Modular multiplication without trial division,” Math. Comput., vol. 44, no. 170, pp. 519-521, Apr. 1985. [15] R.C.C. Cheung, N.J. Telle, W. Luk, and P.Y.K. Cheung, “Customizable elliptic curve cryptosystems,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 13, no. 9, pp.1048-1059, Sep. 2005. [16] Y. Eslami, A. Sheikholeslami, P.G. Gulak, S. Masui, and K. Mukaida, “An area-efficient universal cryptography processor for smart cards,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 14, no. 1, pp. 43-56, Jan. 2006. [17] P.H.W. Leong and I.K.H Leung, “A microcoded elliptic curve processor using FPGA technology,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 10, no. 5, pp. 550-559, Oct. 2002. [18] M. Bednara, M. Daldrup, J. Gathen, J. Shokrollahi, and J. Teich, "Reconfigurable implementation of elliptic curve crypto algorithms," Proc. IEEE Int. Parallel Distributed Processing Symp., Apr. 2002, pp. 157-164. [19] N.A. Saqib, F. Rodriguez-Henriquez, and A. Diaz-Perez, "A parallel architecture for fast computation of elliptic curve scalar multiplication over GF (2m)," Proc. IEEE Int. Parallel Distributed Processing Symp., Apr. 2004, pp. 144-151. [20] M. Morales-Sandoval and C. Feregrino-Uribe, "On the hardware design of an elliptic curve cryptosystem," Proc. 5th IEEE Mexican Int. Conf., 2004, pp. 64-70. [21] S.B. Wicker, Error Control Systems for Digital Communication and Storage, Englewood Cliffs, NJ: Prentice-Hall, 1995. [22] E. Savas and C.K. Koc, “The Montgomery modular inverse-revisited”, IEEE Trans. Comput., vol. 49, no. 7, pp. 763-766, July 2000. [23] E. Savas and C.K. Koc, “Architectures for unified field inversion with applications in elliptic curve cryptography”, Proc. IEEE Conf. Electron., Circuits Syst., Sep. 2002, vol. 3, pp. 1155-1158. [24] C.D. Walter, “Systolic modular multiplication,” IEEE Trans. Comput., vol.42, no. 3, pp. 376-378, Mar. 1993. [25] T.W. Kwon, C.S. You, W.S. Heo, Y.K. Kang, and J.R. Choi, “Two implementation methods of a 1024-bit RSA cryptoprocessor based on modified Montgomery algorithm,” Proc. IEEE Int. Symp. Circuits Syst., May 2001, vol. 4, pp. 650-653. [26] A. Cilardo, A. Mazzeo, L. Romano, and G.P. Saggese, “Carry-save Montgomery modular exponentiation on reconfigurable hardware,” Proc. Design, Autom. Test Eur, Feb. 2004, vol. 3, pp. 206-211. [27] C. McIvor, M. McLoone, and J.V. McCanny, “Fast Montgomery modular multiplication and RSA cryptographic processor architectures,” Proc. 37th Asilomar Conf. Signals, Syst. Comput., Nov. 2003, vol. 1, pp. 379-384. [28] K. Manochehri and S. Pourmozafari, “Fast Montgomery modular multiplication by pipelined CSA architecture,” Proc. IEEE Int. Conf. Microw., Dec. 2004, pp. 144-147. [29] C. McIvor, M. McLoone, and J.V. McCanny, “Modified Montgomery modular multiplication and RSA exponentiation techniques,” IEE Proc.-Comp. Digit. Tech., vol. 151, no. 6, pp. 402-408. Nov. 2004. [30] C.C. Yang, T.S. Chang, and C.W. Jen, “A new RSA cryptosystem hardware design based on Montgomery’s algorithm,” IEEE Trans. Circuits Syst. II , Exp. Briefs, vol. 45, no. 7, pp. 908-913, July 1998. [31] A. Daly and W. Marnane, “Efficient architectures for implementing Montgomery modular multiplication and RSA modular exponentiation on reconfigurable logic,” Proc. ACM/SIGDA 10th Int. Symp. FPGAs, Feb. 2002, pp. 40-49. [32] Q. Liu, F. Ma, D. Tong, and X. Cheng, “A regular parallel RSA processor,” Proc. IEEE Int. Midwest Symp. Circuits Syst., July 2004, vol. 3, pp. iii-467-470. [33] A.P. Fournaris and O. Koufopavlou, “A new RSA encryption architecture and hardware implementation based on optimized Montgomery multiplication,” Proc. IEEE Int. Symp. Circuits Syst., May 2005, vol. 5, pp. 4645-4648. [34] J.H. Hong, and C.W. Wu, “Cellular-array modular Multiplier for fast RSA public-key cryptosystem based on modified booth’s algorithm,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 11, no. 3, pp. 474-484, June 2003. [35] D.E. Knuth, Seminumerical Algorithms, the Art of Computer Programming, vol. 2, Reading, MA: Addison-Wesley, 1981. [36] N. Takagi, J. Yoshiki, and K. Takagi, “A fast algorithm for multiplicative inversion in GF(2m) using normal basis”, IEEE Trans. Comput., vol. 42, no. 9, pp. 1141-1146, Sep. 1993. [37] R.P. Brent and H.T. Kung, “Systolic VLSI arrays for polynomial GCD computation”, IEEE Trans. Comput., vol. 33, no. 8, pp. 731-736, Aug. 1984. [38] J. Stein, “Computational problems associated with Racah algebra,” J. Comput. Phys., vol. 1, pp. 397-405, 1967. [39] K. Araki, I. Fujita, and M. Morisue, “Fast inverter over finite field based on Euclid’s algorithm”, IEICE Trans Fundam., vol. E72, pp. 1230-1234, Nov. 1989. [40] H. Brunner, A. Curiger, and M. Hofstetter, “On computing multiplicative inverses in GF(2m),” IEEE Trans. Comput., vol. 42, no. 8, pp. 1010-1015, Aug. 1993. [41] J.H. Guo and C.L. Wang, “Hardware-efficient systolic architecture for inversion and division in GF(2m)”, IEE Proc.-Comp. Digit. Tech., vol. 145, no. 4, pp. 272-278, July 1998. [42] Y. Watanabe, N. Takagi, and K. Takagi, “A VLSI algorithm for division in GF(2m) based on extended binary GCD algorithm”, IEICE Trans Fundam, vol. E85-A, pp. 994-999, May 2002. [43] C.H. Wu, C.M. Wu, M.D. Shieh, and Y.T. Hwang, “High-speed, low-complexity systolic designs of novel iterative division algorithms in GF(2m),” IEEE Trans. Comput., vol. 53, no. 3, pp. 375-380, Mar. 2004. [44] Artisan Components, “TSMC 0.13 μm (CL013G) Process 1.2-Volt SAGE-XTM Standard Cell Library Databook,” Jan. 2004. [45] N. Nedjah and L.M. Mourelle, “Three hardware architectures for the binary modular exponentiation: sequential, parallel, and systolic,” IEEE Trans. Circuits Syst. I , Reg. Papers, vol. 53, no. 3, pp. 627–633, Mar. 2006. [46] P.S. Chen, S.A. Hwang, and C.W. Wu, “A systolic RSA public key cryptosystem,” Proc. IEEE Int. Symp. Circuits Syst., May 1996, pp. 408-411. [47] A.A.A. Gutub and A.F. Tenca, “Efficient scalable hardware architecture for Montgomery inverse computation in GF(p)”, IEEE Workshop Signal Process. Syst., Aug. 2003, pp. 93-98. [48] D.I. Moldovan and J.A.B. Fortes, “Partitioning and mapping algorithms into fixed size systolic arrays,” IEEE Trans. Comput., vol. 35, no. 1, pp. 1-12, Jan. 1986. [49] S.E. Eldridge and C.D. Walter, “Hardware implementation of Montgomery’s modular multiplication algorithm,” IEEE Trans. Comput., vol. 42, no. 6, pp. 693-699, June 1993. [50] T. Itoh and S. Tsujii, "A fast algorithm for computing multiplicative inverses in GF(2m) using normal basis," Inform. Comput. vol. 78, pp.171-177, 1988. [51] C.L. Wang and J.L. Lin, “Systolic array implementation of multipliers for finite fields GF(2m),” IEEE Trans. Circuits Syst. II , Exp. Briefs, vol. 38, no. 7, pp. 796-800, July 1991. [52] Artisan Components, “TSMC 0.18 μm Process 1.8-Volt SAGE-XTM Standard Cell Library Databook,” Sep. 2003. [53] B. Parhami, Computer Arithmetic: Algorithms and Hardware Designs, New York: Oxford Univ. Press, 2000. [54] D.R. Stinson, Cryptography: Theory and Practice, CRC Press, Inc., 1995. [55] E. Al-Daoud, R. Mahmod, M. Rushdan, and A. Kilicman, “A new addition formula for elliptic curves over GF(2n)”, IEEE Trans. Comput., vol. 51, no. 8, Aug. 2002. [56] C.K. Koc and T. Acar, “Montgomery multiplication in GF(2k)”, Designs, Codes and Cryptography, vol. 14, no. 1, pp. 57-69, 1998. [57] W.W. Peterson and E.J. Weldon, Error-Correcting Codes, Cambridge, MA: MIT Press, 1972. [58] S.K. Jain, L. Song, and K.K. Parhi, “Efficient semisystolic architectures for finite-field arithmetic,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 6, no. 1, pp.101-113, Mar. 1998. [59] H. Wu, “Bit-parallel finite field multiplier and squarer using polynomial basis,” IEEE Trans. Comput., vol. 51, no. 7, pp. 750-758, July 2002. [60] J.H. Kim and D.H. Lee, “A compact finite field processor over GF(2m) for elliptic curve cryptography,” Proc. IEEE Int. Symp. Circuits Syst., May 2002, pp. II-340-II-343. [61] J. Park, J.T. Hwang, and Y.C. Kim, “FPGA and ASIC implementation of ECC processor for security on medical embedded system,” Proc. IEEE 3th Int. Conf. Inf. Technol. Appl., July 2005, pp. 547-551. [62] J. Goodman and A.P. Chandrakasan, “An energy-efficient reconfigurable public-key cryptography processor,” IEEE J. Solid-State Circuits, vol. 36, no. 11, pp. 1808-1820, Nov. 2001. [63] A. Satoh and K. Takano, "A scalable dual-field elliptic curve cryptographic processor," IEEE Trans. Comput., vol. 52, no. 4, pp. 449-460, Apr. 2003. [64] C. O’Rourke and B. Sunar, “Achieving NTRU with Montgomery multiplication,” IEEE Trans. Comput., vol. 52, no. 4, Apr. 2003. [65] M.C. Sun, C.P. Su, C.T. Huang, and C.W. Wu, “Design of a scalable RSA and ECC crypto-processor,” Proc. IEEE Asia South Pacific Design Autom. Conf., Jan. 2003, pp. 495-498. [66] K. Sakiyama, L. Batina, B. Preneel, and I. Verbauwhede, “Multicore curve-based cryptoprocessor with reconfigurable modular arithmetic logic units over GF(2n),” IEEE Trans. Comput., vol. 56, no. 9, Sep. 2007. [67] Y. Wang, D.L. Maskell, J. Leiwo, and T. Srikanthan, “Unified signed-digit number adder for RSA and ECC public-key cryptosystems,” Proc. IEEE Asia Pacific Conf. Circuits Syst., Dec. 2006, pp. 1655-1658. [68] X. Zeng, C. Chen, and Q. Zhang, “A reconfigurable public-key cryptography coprocessor,” Proc. IEEE Asia Pacific Conf. Advanced Syst. Integr. Circuits, Aug. 2004, pp. 172-175. [69] Y. Wang, J. Leiwo, and T. Srikanthan, “A unified architecture for crypto-processing in embedded systems,” Proc. IEEE Conf. Embedded Softw. and Syst., Dec. 2005, pp. 1-4. [70] C.H. Kim and C.Y. Hong, “High-speed division architecture for GF(2m),”IEE Electron. Lett., vol. 38, pp. 835-836, July 2002
|