1 |
P. L. Montgomery, 'Modular multiplication without trial division,' Math. Comput., 44, pp. 519-521, 1985
DOI
|
2 |
J. L. Hennessy and D. A. Patterson, 'Computer Architecture : A Quantiative Approach, 3rd edition', Morgan Kaufmann Publishers, CA, 2003
|
3 |
A. J. Menezes, P. C. van Oorschot, S. A. Vanstone, Handbook of Applied Cryptography, CRC press, 1997
|
4 |
Douglas R. Stinson, Cryptography Theory and Practice 2nd Edition (c) 2002 by Chapman & Hall/CRC
|
5 |
R. L. Rivest, A. Shamir, and L. M. Adleman, 'A Method for Obtaining Digital Signatures and Public-key Cryptosystems,' Communications of the ACM, Vol. 21, pp. 120-126, Feb. 1978
DOI
ScienceOn
|
6 |
서광석, 김용태, 임종인, 김창한, 수론과 암호학, 경문사, 1998
|
7 |
William Stallings, Cryptography and network security principles and practice, 3rd Edition, (c) 003 by Pearson Education, In
|
8 |
T. Izu and B. Moller, 'Improved Parallel Elliptic Curve Multiplication Method Resistant against Side Channel Attacks', LNCS 2551, pp.296-313, 2002
|
9 |
김철, 암호학의 이해, 영풍문고, 1996
|