04.11.2012 Views

1 Montgomery Modular Multiplication in Hard- ware

1 Montgomery Modular Multiplication in Hard- ware

1 Montgomery Modular Multiplication in Hard- ware

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

FEI KEMT<br />

[27] Bernste<strong>in</strong>, D. Circuits for Integer Factorization: A Proposal. Manuscript.<br />

Available at http://cr.yp.to/papers.html#nfscircuit, 2001.<br />

[28] Blum, L., Blum, M., and Shub, M. A simple unpredictable pseudo-<br />

random number generator. SIAM Journal on Comput<strong>in</strong>g 15 (1986), 364–383.<br />

[29] Blum, T., and Paar, C. <strong>Montgomery</strong> modular exponentiation on reconfig-<br />

urable hard<strong>ware</strong>. In Proceed<strong>in</strong>gs of the 14th IEEE Symposium on Computer<br />

Arithmetic (Adelaide, Australia) (Los Alamitos, CA, April 1999), Koren and<br />

Kornerup, Eds., IEEE Computer Society Press, pp. 70–77.<br />

[30] Blum, T., and Paar, C. High radix montgomery modular exponentiation<br />

on reconfigurable hard<strong>ware</strong>. IEEE Transaction on Computers 50, 7 (2001),<br />

759–764.<br />

[31] Bock, H., Bucci, M., and Luzzi, R. An offset-compensated oscillator-<br />

based random bit source for security applications. In Cryptographic <strong>Hard</strong><strong>ware</strong><br />

and Embedded Systems – CHES 2004 (Berl<strong>in</strong>, Germany, 2004), M. Joye and J.-<br />

J. Quisquater, Eds., no. 3156 <strong>in</strong> Lecture Notes <strong>in</strong> Computer Science, Spr<strong>in</strong>ger-<br />

Verlag, pp. 268–281.<br />

[32] Bosma, W. Primality test<strong>in</strong>g us<strong>in</strong>g elliptic curves. Tech. Rep. 85-12, Math-<br />

ematical Institut, Universiteit van Amsterdam, 1985.<br />

[33] Brent, R. P. Some Integer Factorization Algorithms Us<strong>in</strong>g Elliptic Curves.<br />

In Australian Computer Science Communications 8 (1986), pp. 149–163.<br />

[34] Brent, R. P. Factorization of the tenth Fermat number. Mathematics of<br />

Computation 68, 225 (1999), 429–451.<br />

[35] Brown, M., Hankerson, D., López, J., and Menezes, A. Soft<strong>ware</strong><br />

Implementation of the NIST Elliptic Curves Over Prime Fields. In Top-<br />

ics <strong>in</strong> Cryptology — CT-RSA 2001 (Berl<strong>in</strong>, April 2001), D. Naccache, Ed.,<br />

vol. LNCS 2020, Spr<strong>in</strong>ger-Verlag, pp. 250–265.<br />

[36] Bucci, M., and Luzzi, R. Design of testable random bit generators. In<br />

Cryptographic <strong>Hard</strong><strong>ware</strong> and Embedded Systems – CHES 2005 (Berl<strong>in</strong>, Ger-<br />

many, 2005), J. Rao and B. Sunar, Eds., no. 3659 <strong>in</strong> Lecture Notes <strong>in</strong> Computer<br />

Science, Spr<strong>in</strong>ger-Verlag, pp. 147–156.<br />

129

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!