1 |
Thomas S. Messerges, "Power Analysis Attacks and Countermeasures for Cryptographic Algorithms", Ph.D Thesis, University of Illinois at Chicago, 2000.
|
2 |
박 영호, Side Channel Attack을 고려한 알고리즘 연구, ETRI 최종 연구보고서, 2003. 11.
|
3 |
A.J. Menezes, Elliptic Curve Public Key Cryptosystems, Kluwer Academic Publishers, 1993.
|
4 |
P. Montgomery, "Speeding the Pollard and elliptic curve methods of factorization", Mathematics of Computation, vol 48, pp.243-264, 1987.
DOI
ScienceOn
|
5 |
J. Lopez and R. Dahab, "Fast Multiplication on Elliptic Curves over GF() without Precomputation", CHES '99, LNCS 1717, pp.316-327, 1999.
|
6 |
American Bankers Association, "Working Draft: American National Standard X9.62-1998 Public Key Cryptography for the Financial Services Industry," September 20, 1998.
|
7 |
Edoardo D. Mastrovito, VLSI Architectures for Computations in Galois Fields, Linkoping University, Ph.D Thesis, 1991.
|
8 |
H. Brunner, A. Curiger, and M. Hosfstetter, "On Computing Multiplicative Inverses in GF()," IEEE Transaction on Computers, Vol. 42, No. 8, pp.1010-1015, Aug., 1993.
DOI
ScienceOn
|
9 |
J. Guo, C. Wang, "Systolic Array Implementation of Euclid's Algorithm for Inversion and Division in GF()," IEEE Transaction on Computers, Vol.47, No.10, pp.1161-1167, Oct., 1998.
DOI
ScienceOn
|
10 |
Samsung Electronics, STD90 /MDL90 0.35um 3.3V CMOS standard cell library for pure logic/ MDL Products, 2000.
|
11 |
G. B. Agnew, R. C. Mullin and S. A. Vanstone, "Implementation of Cryptosystems over GF(2155)," IEEE Journal of Selected Area in Communication, Vol. 11, No.5, pp.804-813, 1993.
DOI
ScienceOn
|
12 |
김의석, 정용진, "새로운 유한체 나눗셈기를 이용한 타원 곡선 암호(ECC) 스칼라 곱셈기의 설계," 한국 통신 학회 논문지, Vol.29, No.5C, pp.726-736, 2004. 5.
|