References
- P. Choi, S. Lee, and D.K. Kim, "Design of Efficient Modular Inversion Module Using Resource Sharing," Proceeding of Korea Multimedia Society International Conference on Multimedia Information Technology and Applications, pp. 298-299, 2015.
- P. Choi, J. Kong, and D.K. Kim, "Analysis of Hardware Modular Inversion Modules for Elliptic Curve Cryptography," Proceeding of International SoC Design Conference, pp. 313-314, 2015.
- E. Barker and A. Roginsky, NIST Special Publication 800-131A Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths, National Institute of Standards and Technology, 2011.
- W. Lee, C. Roh, and D. Ryu, "Critical Path Analysis for Codesign of Public Key Crypto- Systems," Journal of Korea Multimedia Society, Vol. 8, No. 1, pp. 78-87, 2016.
- N. Takagi, "A Modular Inversion Hardware Algorithm with a Redundant Binary Representation," IEICE Transactions on Information and Systems, Vol. E76-D, No. 8, pp. 863-869, 1993.
- X. Yan and S. Li, "Modified Modular Inversion Algorithm for VLSI Implementation," Proceeding of International Conference on ASIC, pp. 90-93, 2007.
- C. Chen and Z. Qin, "Fast Algorithm and Hardware Architecture for Modular Inversion in GF (p)," Proceeding of International Conference on Intelligent Networks and Intelligent Systems, pp. 43-45, 2009.
- S. Ma, Y. Hao, Z. Pan, and H. Chen, "Fast Implementation for Modular Inversion and Scalar Multiplication in the Elliptic Curve Cryptography," Proceeding of International Symposium on Intelligent Information Technology Application, pp. 488-492, 2008.
- R. Lorencz, "New Algorithm for Classical Modular Inverse," Proceeding of International Workshop on Cryptographic Hardware and Embedded Systems, pp. 57-70, 2002.
- J. Hlavac and R. Lorencz, "Arithmetic Unit for Computations in GF (p) with the Left-shifting Multiplicative Inverse Algorithm," Proceeding of International Conference on Architecture of Computing Systems, pp. 268-279, 2013.
- B.S. Kaliski, "The Montgomery Inverse and its Applications," IEEE Transactions on Computers, Vol. 44, No. 8, pp. 1064-1065, 1995. https://doi.org/10.1109/12.403725
- E. Savas and C.K. Koc, "The Montgomery Modular Inverse-revisited," IEEE Transactions on Computers, Vol. 49, Issue 7, pp. 763-766, 2000. https://doi.org/10.1109/12.863048
- R. Deng and Y. Zhou, "Improvement to Montgomery Modular Inverse Algorithm," IEEE Transactions on Computers, Vol. 55, No. 9, pp. 1207-1210, 2006. https://doi.org/10.1109/TC.2006.150
- FIPS PUB 186-2. Digital Signature Standard, National Institute of Standards and Technology, 2000.
- E. Barker, D. Johnson, and M. Smid, NIST Special Publication 800-56A: Recommendation for Pair-wise Key Establishment Schemes Using Discrete Logarithm Cryptography, Computer Security, National Institute of Standards and Technology, Vol. 114, 2007.
- ANS X9. 62: 2005: Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm, American National Standards Institute, Vol. 1430, 2005.
- D. Hankerson, A.J. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography, Springer Science & Business Media, New York, USA, 2006.
- D. Galbi and A.K. Chan, Four-to-two Adder Cell for Parallel Multiplication, US4901270, US, 1990.
Cited by
- 모듈러 역원 연산의 확장 가능형 하드웨어 구현 vol.24, pp.3, 2020, https://doi.org/10.7471/ikeee.2020.24.3.901