Author:
Vollala Satyanarayana,Ramasubramanian N.,Tiwari Utkarsh
Publisher
Springer International Publishing
Reference37 articles.
1. Azarderakhsh R, Järvinen KU, Mozaffari-Kermani M (2014) Efficient algorithm and architecture for elliptic curve cryptography for extremely constrained secure applications. IEEE Trans Circ Syst I: Reg Papers 61(4):1144–1155
2. Azarderakhsh R, Reyhani-Masoleh A (2011) Efficient fpga implementations of point multiplication on binary edwards and generalized hessian curves using gaussian normal basis. IEEE Trans Very Large Scale Integ (VLSI) Syst 20(8):1453–1466
3. Biham E, Perle S (2018) Conditional linear cryptanalysis–cryptanalysis of des with less than 242 complexity. IACR transactions on symmetric cryptology, pp 215–264
4. Buchty R, Heintze N, Oliva D (2004) Cryptonite–a programmable crypto processor architecture for high-bandwidth applications. In: International conference on architecture of computing systems, Springer, pp 184–198
5. Chen Z, Schaumont P (2011) A parallel implementation of montgomery multiplication on multicore systems: algorithm, analysis, and prototype. IEEE Trans Comput 60(12):1692–1703. https://doi.org/10.1109/TC.2010.256
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献