1 Montgomery Modular Multiplication in Hard- ware
1 Montgomery Modular Multiplication in Hard- ware
1 Montgomery Modular Multiplication in Hard- ware
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
FEI KEMT<br />
[27] Bernste<strong>in</strong>, D. Circuits for Integer Factorization: A Proposal. Manuscript.<br />
Available at http://cr.yp.to/papers.html#nfscircuit, 2001.<br />
[28] Blum, L., Blum, M., and Shub, M. A simple unpredictable pseudo-<br />
random number generator. SIAM Journal on Comput<strong>in</strong>g 15 (1986), 364–383.<br />
[29] Blum, T., and Paar, C. <strong>Montgomery</strong> modular exponentiation on reconfig-<br />
urable hard<strong>ware</strong>. In Proceed<strong>in</strong>gs of the 14th IEEE Symposium on Computer<br />
Arithmetic (Adelaide, Australia) (Los Alamitos, CA, April 1999), Koren and<br />
Kornerup, Eds., IEEE Computer Society Press, pp. 70–77.<br />
[30] Blum, T., and Paar, C. High radix montgomery modular exponentiation<br />
on reconfigurable hard<strong>ware</strong>. IEEE Transaction on Computers 50, 7 (2001),<br />
759–764.<br />
[31] Bock, H., Bucci, M., and Luzzi, R. An offset-compensated oscillator-<br />
based random bit source for security applications. In Cryptographic <strong>Hard</strong><strong>ware</strong><br />
and Embedded Systems – CHES 2004 (Berl<strong>in</strong>, Germany, 2004), M. Joye and J.-<br />
J. Quisquater, Eds., no. 3156 <strong>in</strong> Lecture Notes <strong>in</strong> Computer Science, Spr<strong>in</strong>ger-<br />
Verlag, pp. 268–281.<br />
[32] Bosma, W. Primality test<strong>in</strong>g us<strong>in</strong>g elliptic curves. Tech. Rep. 85-12, Math-<br />
ematical Institut, Universiteit van Amsterdam, 1985.<br />
[33] Brent, R. P. Some Integer Factorization Algorithms Us<strong>in</strong>g Elliptic Curves.<br />
In Australian Computer Science Communications 8 (1986), pp. 149–163.<br />
[34] Brent, R. P. Factorization of the tenth Fermat number. Mathematics of<br />
Computation 68, 225 (1999), 429–451.<br />
[35] Brown, M., Hankerson, D., López, J., and Menezes, A. Soft<strong>ware</strong><br />
Implementation of the NIST Elliptic Curves Over Prime Fields. In Top-<br />
ics <strong>in</strong> Cryptology — CT-RSA 2001 (Berl<strong>in</strong>, April 2001), D. Naccache, Ed.,<br />
vol. LNCS 2020, Spr<strong>in</strong>ger-Verlag, pp. 250–265.<br />
[36] Bucci, M., and Luzzi, R. Design of testable random bit generators. In<br />
Cryptographic <strong>Hard</strong><strong>ware</strong> and Embedded Systems – CHES 2005 (Berl<strong>in</strong>, Ger-<br />
many, 2005), J. Rao and B. Sunar, Eds., no. 3659 <strong>in</strong> Lecture Notes <strong>in</strong> Computer<br />
Science, Spr<strong>in</strong>ger-Verlag, pp. 147–156.<br />
129