04.11.2012 Views

1 Montgomery Modular Multiplication in Hard- ware

1 Montgomery Modular Multiplication in Hard- ware

1 Montgomery Modular Multiplication in Hard- ware

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

FEI KEMT<br />

[62] Fischer, V., Drutarovsk´y, M., ˇ Simka, M., and Celle, F. Simple<br />

PLL-based True Random Number Generator for Embedded Digital Systems.<br />

In Proceed<strong>in</strong>gs of IEEE Design and Diagnostics of Electronic Circuits and<br />

Systems Workshop – DDECS 2004 (Stará Lesná, Slovakia, Apr. 18–21, 2004),<br />

pp. 129–136.<br />

[63] Franke, J., and Kle<strong>in</strong>jung, T. E-mail announcement.<br />

http://www.crypto-world.com/announcements/rsa200.txt, May 2005.<br />

[64] Franke, J., Kle<strong>in</strong>jung, T., Paar, C., Pelzl, J., Priplata, C., and<br />

Stahlke, C. SHARK — A Realizable Special <strong>Hard</strong><strong>ware</strong> Siev<strong>in</strong>g Device<br />

for Factor<strong>in</strong>g 1024-bit Integers. In Workshop on Cryptographic <strong>Hard</strong><strong>ware</strong> and<br />

Embedded Systems — CHES 2005, Ed<strong>in</strong>burgh (August 2005), LNCS, Spr<strong>in</strong>ger.<br />

To appear.<br />

[65] Franke, J., Kle<strong>in</strong>jung, T., Paar, C., Pelzl, J., Priplata, C., ˇ Simka,<br />

M., and Stahlke, C. An effcient hard<strong>ware</strong> architecture for factor<strong>in</strong>g <strong>in</strong>tegers<br />

with the Elliptic Curve Method. In 1st Workshop on Special-purpose <strong>Hard</strong><strong>ware</strong><br />

for Attack<strong>in</strong>g Cryptographic Systems – SHARCS 2005 (Paris, France, Feb. 24–<br />

25, 2005), pp. 51–62.<br />

[66] Frolek, V. Implementation of asymmetric encryption algorithms <strong>in</strong> recon-<br />

figurable circuits. Master’s thesis, Technical University of Koˇsice, Department<br />

of Electronics and Multimedia Communications, Jan.-May 2002.<br />

[67] Gaj, K., Kwon, S., Baier, P., Kohlbrenner, P., Le, H., Khaleelud-<br />

d<strong>in</strong>, M., and Bachimanchi, R. Implement<strong>in</strong>g the elliptic curve method of<br />

factor<strong>in</strong>g <strong>in</strong> reconfigurable hard<strong>ware</strong>. In Workshop on Special-purpose <strong>Hard</strong>-<br />

<strong>ware</strong> for Attack<strong>in</strong>g Cryptographic Systems – SHARCS 2006 (Cologne, Ger-<br />

many, Apr. 03–04, 2006).<br />

[68] Gennaro, R. Randomness <strong>in</strong> cryptography. IEEE Security and Privacy 4,<br />

2 (2006), 64–67.<br />

[69] Goldberg, I., and Wagner, D. Randomness and the Netscape browser.<br />

Dr. Dobb’s Journal (Jan. 1996), 66–70.<br />

[70] Golic, J. New methods for digital generation and postprocess<strong>in</strong>g of random<br />

data. IEEE Transaction on Computers 55, 10 (2006), 1217–1229.<br />

133

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!