04.11.2012 Views

1 Montgomery Modular Multiplication in Hard- ware

1 Montgomery Modular Multiplication in Hard- ware

1 Montgomery Modular Multiplication in Hard- ware

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

FEI KEMT<br />

CHES 2001 (Berl<strong>in</strong>, Germany, May 13–16, 2001), Ç. K. Koç, D. Naccache,<br />

and C. Paar, Eds., vol. 2162 of Lecture Notes <strong>in</strong> Computer Science, Spr<strong>in</strong>ger-<br />

Verlag, pp. 103–117.<br />

[101] Schneier, B. Applied Cryptography: Protocols, Algorithms, and Source Code<br />

<strong>in</strong> C, 2nd ed. John Wiley & Sons, Inc., New York, 1996.<br />

[102] Secretariat National Committee for Information Technology<br />

Standardization. Fibre Channel - Methodologies for Jitter Specification,<br />

T11.2 / Project 1230/ Rev 10, June 1999.<br />

[103] Shamir, A., and Tromer, E. Factor<strong>in</strong>g Large Numbers with the TWIRL<br />

Device. In Advances <strong>in</strong> Cryptology — Crypto 2003 (2003), vol. 2729 of LNCS,<br />

Spr<strong>in</strong>ger, pp. 1–26.<br />

[104] Silverman, R. D. The multiple polynomial quadratic sieve. Mathematics of<br />

Computation 48 (1987), 329–340.<br />

[105] Sunar, B., Mart<strong>in</strong>, W. J., and St<strong>in</strong>son, D. R. A provably secure true<br />

random number generator with built-<strong>in</strong> tolerance to active attacks. IEEE<br />

Transaction on Computers 56, 1 (2007), 109–119.<br />

[106] Tang, K., Siegel, P. H., and Milste<strong>in</strong>, L. B. A comparison of long<br />

versus short spread<strong>in</strong>g sequences <strong>in</strong> coded asynchronous DS-CDMA systems.<br />

IEEE Journal on Selected Areas <strong>in</strong> Communications 19, 8 (Aug. 2001), 1614–<br />

1624.<br />

[107] Tektronix. A Guide to Understand<strong>in</strong>g and Characteriz<strong>in</strong>g Tim<strong>in</strong>g Jitter.<br />

[108] Tenca, A. F., and Ç. K. Koç. A scalable architecture for <strong>Montgomery</strong><br />

multiplication. In Cryptographic <strong>Hard</strong><strong>ware</strong> and Embedded Systems (Berl<strong>in</strong>,<br />

Germany, 1999), Ç.K. Koç and C. Paar, Eds., no. 1717 <strong>in</strong> Computer Science,<br />

Spr<strong>in</strong>ger Verlag, pp. 94–108.<br />

[109] Tenca, A. F., and Ç. K. Koç. A scalable architecture for modular multipli-<br />

cation based on <strong>Montgomery</strong>’s algorithm. IEEE Transactions on Computers<br />

52, 9 (Sept. 2003), 1215–1221.<br />

[110] Tenca, A. F., Todorov, G., and Ç. K. Koç. High-radix design of a<br />

scalable modular multiplier. In Cryptographic <strong>Hard</strong><strong>ware</strong> and Embedded Sys-<br />

tems – CHES 2001 (Berl<strong>in</strong>, Germany, May 2001), Ç. K. Koç, D. Naccache,<br />

137

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!