1 |
D. E. Knuth, "The Art of Computer Programming," Addison-Wesley Publis hing Company, Reading, MA, 1981
|
2 |
H. Cohen, "'A Course in Computation al Algebric Number Theory," Springer-Verlag, Berlin, Heidelberg, 1993
|
3 |
American National Standard for Financial Services, "Public Key Cryptography for the financial services industry: ECDSA, X9.62," 1998
|
4 |
D. Hankerson, A. Menezes, S. Vanstone, "Guide to Elliptic Curve Cryptography," Springer, 2004
|
5 |
M. Brown, D. Hankerson, A. Menezes, "Software Implementation of the NIST Elliptic Curves over Prime Fields", Proceedings of CT-RSA 2001, LNCS2020, Springer Verlag, pp.250-265, 2001
|
6 |
N. S. Chang, C. H. Kim, S. Hong, Y. Park, "Efficeint Bit-Parallel Polynomi ial Basis Multipliers fo All Irreducible Trinomial," Jonornal of The Korea Institute of information Security & Cryptology, 19(2), pp. 49-61, Apr. 2009
|
7 |
S. Gueron, V. Krasnov, "Fast prime field elliptic-curve cryptography with 256-bit primes," J. Cryptographic Engin., vol. 5, pp. 141-151, Jun, 2015
DOI
|
8 |
J. Chung, M. A. Hasan, "Low-weight polynomial form integers for efficient modular multiplication" IEEE Tran sactions on Computers, 56(1), pp. 44-57, Jan. 2007
DOI
|