Author:
Gura Nils,Chang Shantz Sheueling,Eberle Hans,Gupta Sumit,Gupta Vipul,Finchelstein Daniel,Goupy Edouard,Stebila Douglas
Publisher
Springer Berlin Heidelberg
Reference21 articles.
1. Agnew, G.B., Mullin, R.C., Vanstone, S.A.: An Implementation of Elliptic Curve Cryptosystems Over F2155. In IEEE Journal on Selected Areas in Communications, 11(5):804–813, June 1993.
2. Bednara, M., Daldrup, M., von zur Gathen, J., Shokrollahi, J., Teich, J.: Recon-figurable Implementation of Elliptic Curve Crypto Algorithms. Reconfigurable Architectures Workshop, 16th International Parallel and Distributed Processing Symposium, April 2002.
3. Blake, I., Seroussi, G., Smart, N.: Elliptic Curves in Cryptography. London Mathematical Society Lecture Note Series 265, Cambridge University Press, 1999.
4. Blake-Wilson, S., Dierks, T., Hawk, C.: ECC Cipher Suites for TLS. Internet draft, http://www.ietf.org/internet-drafts/draft-ietf-tls-ecc-01.txt , March 2001.
5. Blum, T., Paar, C.: High Radix Montgomery Modular Exponentiation on Recon-figurable Hardware. To Appear in IEEE Transactions on Computers.
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献