1 |
A. J. Menezes, P. C. van Oorschot, S. A. Vanstone, Handbook of Applied Cryptography, CRC press, 1997
|
2 |
M. Rhee, Cryptography and Secure Communications, McGraw-Hill Book Co., 1994
|
3 |
B. Schneier, Applied Cryptography, second edition, John Wiley & Sons, Inc., 1996
|
4 |
D. Hankerson, J. L. Hernandez, and A. Menezes, 'Software Implementation of Elliptic Curve Cryptography over Binary Fields,' Crypto95
|
5 |
G. B. Agnew, R. C. Mullin, and S. A. Vanstone, 'An Implementation of Elliptic Curve Cryptosystems Over F2155,' IEEE Journal on Selected Areas in Communications, Vol. 11, No.5, Jun. 1993
|
6 |
G. L. Feng, 'A VLSI Architecture for Fast Inversion in GF(),' IEEE Trans. Computers, Vol. 38, no. 10, pp. 1383-1386, Oct. 1989
DOI
ScienceOn
|
7 |
R. P. Brent and H. T. Kung, 'Systolic VLSI arrays for polynomial GCD computation', IEEE Transactions on Computers, August 1984, Vol. C-33, No.8, pp.731-736
DOI
ScienceOn
|
8 |
H. Brunner, A. Cruiger, and M. Hofstetter: 'On Computing Multiplicative Inverses in GF()', IEEE Transactions on Computers, August 1993, Vol. 42, No.8, pp. 1010-1015
DOI
ScienceOn
|
9 |
Jyh-Huei Guo, Chin-Liang Wang : 'Systolic Array Implementation of Euclid's Algorithm for Inversion and Division in GF()', IEEE Transactions on Computers, October 1998, Vol. 47, No. 10, pp.1161-1167
DOI
ScienceOn
|
10 |
Edoardo D. Mastrovito, VLSI Architectures for Computations in Galois Fields, Linkoping Studies in Science and Technology, Dissertations, No.242, 1991
|