04.11.2012 Views

1 Montgomery Modular Multiplication in Hard- ware

1 Montgomery Modular Multiplication in Hard- ware

1 Montgomery Modular Multiplication in Hard- ware

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

FEI KEMT<br />

[71] Gura, N., Chang, S., 2, H., Sumit, G., Gupta, V., F<strong>in</strong>chelste<strong>in</strong>, D.,<br />

Goupy, E., and Stebila, D. An End-to-End Systems Approach to Elliptic<br />

Curve Cryptography. In Cryptographic <strong>Hard</strong><strong>ware</strong> and Embedded Systems —<br />

CHES 2002 (2002), Ç. K. Koç and C. Paar, Eds., vol. LNCS 2523, Spr<strong>in</strong>ger,<br />

pp. 349–365.<br />

[72] Huang, M., Gaj, K., Kwon, S., and El-Ghazawi, T. An optimized<br />

hard<strong>ware</strong> architecture for the <strong>Montgomery</strong> <strong>Multiplication</strong> Algorithm. In PKC<br />

2008: 11th International Workshop on Practice and Theory <strong>in</strong> Public Key<br />

Cryptography, Barcelona, Spa<strong>in</strong> (March 2008), pp. 214–228.<br />

[73] Jun, B., and Kocher, P. The <strong>in</strong>tel random number generator.<br />

White paper prepared for <strong>in</strong>tel corporation, Cryptography Research, Inc.,<br />

http://www.cryptography.com/resources/whitepapers/IntelRNG.pdf, Apr.<br />

1999.<br />

[74] Killmann, W., and Sch<strong>in</strong>dler, W. A proposal for: Fuctionality Classes<br />

and Evaluation Methodology for True (Physical) Random Number Generators,<br />

Sept. 2001.<br />

[75] K<strong>in</strong>niment, D., and Chester, E. Design of an on-chip random number<br />

generator us<strong>in</strong>g metastability. In Proceed<strong>in</strong>gs of the 28th European Solid-State<br />

Circuit Conference (Sept. 2002), Univ. Bologna, Italy, pp. 595–598.<br />

[76] Knuth, D. E. Sem<strong>in</strong>umerical Algorithms, second ed., vol. 2 of The Art of<br />

Computer Programm<strong>in</strong>g. Addison-Wesley, Read<strong>in</strong>g, Massachusetts, Jan. 10,<br />

1981.<br />

[77] Koblitz, N. Elliptic curve cryptosystems. Mathematics of Computation 48,<br />

177 (Jan. 1987), 203–209.<br />

[78] Koblitz, N., Menezes, A., and Vanstone, S. The state of elliptic curve<br />

cryptography. Designs, Codes and Cryptography 19, 2-3 (Mar. 2000), 173–193.<br />

[79] Kohlbrenner, P., and Gaj, K. An embedded true random number gen-<br />

erator for FPGAs. In Proceed<strong>in</strong>g of the 2004 ACM/SIGDA 12th <strong>in</strong>ternational<br />

symposium on Field programmable gate arrays (2004), ACM Press, pp. 71–78.<br />

[80] Lenstra, A. K. Designs, Codes and Cryptography. Kluwer Academic Pub-<br />

lishers, Boston, 2000, ch. Integer Factor<strong>in</strong>g.<br />

134

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!