1 Montgomery Modular Multiplication in Hard- ware
1 Montgomery Modular Multiplication in Hard- ware
1 Montgomery Modular Multiplication in Hard- ware
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
FEI KEMT<br />
CHES 2001 (Berl<strong>in</strong>, Germany, May 13–16, 2001), Ç. K. Koç, D. Naccache,<br />
and C. Paar, Eds., vol. 2162 of Lecture Notes <strong>in</strong> Computer Science, Spr<strong>in</strong>ger-<br />
Verlag, pp. 103–117.<br />
[101] Schneier, B. Applied Cryptography: Protocols, Algorithms, and Source Code<br />
<strong>in</strong> C, 2nd ed. John Wiley & Sons, Inc., New York, 1996.<br />
[102] Secretariat National Committee for Information Technology<br />
Standardization. Fibre Channel - Methodologies for Jitter Specification,<br />
T11.2 / Project 1230/ Rev 10, June 1999.<br />
[103] Shamir, A., and Tromer, E. Factor<strong>in</strong>g Large Numbers with the TWIRL<br />
Device. In Advances <strong>in</strong> Cryptology — Crypto 2003 (2003), vol. 2729 of LNCS,<br />
Spr<strong>in</strong>ger, pp. 1–26.<br />
[104] Silverman, R. D. The multiple polynomial quadratic sieve. Mathematics of<br />
Computation 48 (1987), 329–340.<br />
[105] Sunar, B., Mart<strong>in</strong>, W. J., and St<strong>in</strong>son, D. R. A provably secure true<br />
random number generator with built-<strong>in</strong> tolerance to active attacks. IEEE<br />
Transaction on Computers 56, 1 (2007), 109–119.<br />
[106] Tang, K., Siegel, P. H., and Milste<strong>in</strong>, L. B. A comparison of long<br />
versus short spread<strong>in</strong>g sequences <strong>in</strong> coded asynchronous DS-CDMA systems.<br />
IEEE Journal on Selected Areas <strong>in</strong> Communications 19, 8 (Aug. 2001), 1614–<br />
1624.<br />
[107] Tektronix. A Guide to Understand<strong>in</strong>g and Characteriz<strong>in</strong>g Tim<strong>in</strong>g Jitter.<br />
[108] Tenca, A. F., and Ç. K. Koç. A scalable architecture for <strong>Montgomery</strong><br />
multiplication. In Cryptographic <strong>Hard</strong><strong>ware</strong> and Embedded Systems (Berl<strong>in</strong>,<br />
Germany, 1999), Ç.K. Koç and C. Paar, Eds., no. 1717 <strong>in</strong> Computer Science,<br />
Spr<strong>in</strong>ger Verlag, pp. 94–108.<br />
[109] Tenca, A. F., and Ç. K. Koç. A scalable architecture for modular multipli-<br />
cation based on <strong>Montgomery</strong>’s algorithm. IEEE Transactions on Computers<br />
52, 9 (Sept. 2003), 1215–1221.<br />
[110] Tenca, A. F., Todorov, G., and Ç. K. Koç. High-radix design of a<br />
scalable modular multiplier. In Cryptographic <strong>Hard</strong><strong>ware</strong> and Embedded Sys-<br />
tems – CHES 2001 (Berl<strong>in</strong>, Germany, May 2001), Ç. K. Koç, D. Naccache,<br />
137