1 Montgomery Modular Multiplication in Hard- ware
1 Montgomery Modular Multiplication in Hard- ware
1 Montgomery Modular Multiplication in Hard- ware
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
FEI KEMT<br />
[62] Fischer, V., Drutarovsk´y, M., ˇ Simka, M., and Celle, F. Simple<br />
PLL-based True Random Number Generator for Embedded Digital Systems.<br />
In Proceed<strong>in</strong>gs of IEEE Design and Diagnostics of Electronic Circuits and<br />
Systems Workshop – DDECS 2004 (Stará Lesná, Slovakia, Apr. 18–21, 2004),<br />
pp. 129–136.<br />
[63] Franke, J., and Kle<strong>in</strong>jung, T. E-mail announcement.<br />
http://www.crypto-world.com/announcements/rsa200.txt, May 2005.<br />
[64] Franke, J., Kle<strong>in</strong>jung, T., Paar, C., Pelzl, J., Priplata, C., and<br />
Stahlke, C. SHARK — A Realizable Special <strong>Hard</strong><strong>ware</strong> Siev<strong>in</strong>g Device<br />
for Factor<strong>in</strong>g 1024-bit Integers. In Workshop on Cryptographic <strong>Hard</strong><strong>ware</strong> and<br />
Embedded Systems — CHES 2005, Ed<strong>in</strong>burgh (August 2005), LNCS, Spr<strong>in</strong>ger.<br />
To appear.<br />
[65] Franke, J., Kle<strong>in</strong>jung, T., Paar, C., Pelzl, J., Priplata, C., ˇ Simka,<br />
M., and Stahlke, C. An effcient hard<strong>ware</strong> architecture for factor<strong>in</strong>g <strong>in</strong>tegers<br />
with the Elliptic Curve Method. In 1st Workshop on Special-purpose <strong>Hard</strong><strong>ware</strong><br />
for Attack<strong>in</strong>g Cryptographic Systems – SHARCS 2005 (Paris, France, Feb. 24–<br />
25, 2005), pp. 51–62.<br />
[66] Frolek, V. Implementation of asymmetric encryption algorithms <strong>in</strong> recon-<br />
figurable circuits. Master’s thesis, Technical University of Koˇsice, Department<br />
of Electronics and Multimedia Communications, Jan.-May 2002.<br />
[67] Gaj, K., Kwon, S., Baier, P., Kohlbrenner, P., Le, H., Khaleelud-<br />
d<strong>in</strong>, M., and Bachimanchi, R. Implement<strong>in</strong>g the elliptic curve method of<br />
factor<strong>in</strong>g <strong>in</strong> reconfigurable hard<strong>ware</strong>. In Workshop on Special-purpose <strong>Hard</strong>-<br />
<strong>ware</strong> for Attack<strong>in</strong>g Cryptographic Systems – SHARCS 2006 (Cologne, Ger-<br />
many, Apr. 03–04, 2006).<br />
[68] Gennaro, R. Randomness <strong>in</strong> cryptography. IEEE Security and Privacy 4,<br />
2 (2006), 64–67.<br />
[69] Goldberg, I., and Wagner, D. Randomness and the Netscape browser.<br />
Dr. Dobb’s Journal (Jan. 1996), 66–70.<br />
[70] Golic, J. New methods for digital generation and postprocess<strong>in</strong>g of random<br />
data. IEEE Transaction on Computers 55, 10 (2006), 1217–1229.<br />
133