[1] |
国家密码管理局. SM2 椭圆曲线公钥密码算法第 1 部分:总则:GM/T 0003.1-2012[S]. 北京:中国标准出版社, 2012:8.
|
|
State Cryptography Administration. SM2 elliptic curve public key cryptography algorithm part 1:general provisions:GM/T 0003.1-2012[S]. 8 Beijing:China Standard Press, 2012:8.
|
[2] |
罗玙榕, 曹进, 李晖 ,等. 基于SM2联合签名的电子发票公开验证方案[J]. 网络与信息安全学报, 2022,8(2): 122-131.
|
|
LUO Y R , CAO J , LI H ,et al. Electronic invoice public verification scheme based on SM2 joint signature[J]. Journal of Network and Information Security, 2022,8(2): 122-131.
|
[3] |
陈锋, 邹洪, 吴亚楠 ,等. 基于SM2密码体系的电力信息安全监控系统设计[J]. 电子设计工程, 2022,30(5): 100-103,108.
|
|
CHEN F , ZOU H , WU Y N ,et al. Design of power information security monitoring system based on sm2 cipher system[J]. Electronic Design Engineering, 2022,30(5): 100-103,108.
|
[4] |
程朝辉 . 基于SM2的无证书加密算法[J]. 密码学报, 2021,8(1): 87-95.
|
|
CHENG C H . Certificateless encryption algorithm based on SM2[J]. Journal of Cryptography, 2021,8(1): 87-95.
|
[5] |
MONTGOMERY P L . Modular multiplication without trial division[J]. Mathematics of Computation, 1985,44(170): 519-521.
|
[6] |
KOC C , ACAR T , JR B . Analyzing and comparing montgomery multiplication algorithms[J]. Micro,IEEE, 1996,16(3): 26-33.
|
[7] |
SOLINAS J A . Generalized mersenne numbers[M]. Faculty of Mathematics,University of Waterloo, 1999.
|
[8] |
PARIHAR A , NAKHATE S . High-speed high-throughput VLSI Architecture for RSA montgomery modular multiplication with efficient format conversion[J]. Journal of the Institution of Engineers (India) Series B, 2019,100(2): 217-222.
|
[9] |
RAHMAN M S , HOSSAIN M S , RAHAT E H ,et al. Efficient hardware implementation of 256-bit ECC processor over prime field[C]// 2019 International Conference on Electrical,Computer and Communication Engineering (ECCE). 2019: 1-6.
|
[10] |
王腾飞, 张海峰, 许森 . SM2专用指令协处理器设计与实现[J]. 计算机工程与应用, 2022,58(2): 102-109.
|
|
WANG T F , ZHANG H F , XU S . Design and implementation of SM2 special instruction coprocessor[J]. Computer Engineering and Applications, 2022,58(2): 102-109.
|
[11] |
DING J N , LI S G , GU Z . High-speed ECC processor over NIST prime fields applied with toom–cook multiplication[J]. IEEE Transactions on Circuits and Systems I, 2019,66(3): 1003-1016.
|
[12] |
李斌, 周清雷, 陈晓杰 ,等. 可重构的素域SM2算法优化方法[J]. 通信学报, 2022,43(3): 30-41.
|
|
LI B , ZHOU Q L , CHEN X J ,et al. Optimization of reconfigurable SM2 algorithm over prime field[J]. Journal of Communication, 2022,43(3): 30-41.
|
[13] |
HOSSAIN M S , KONG Y . High-performance FPGA implementation of modular inversion over F_256 for elliptic curve cryptography[C]// 2015 IEEE International Conference on Data Science and Data Intensive Systems. 2015: 169-174.
|
[14] |
ZHOU L , SU C , HU Z ,et al. Lightweight implementations of NIST P-256 and SM2 ECC on 8-bit resource-constraint embedded device[J]. ACM Transactions on Embedded Computing Systems (TECS), 2019,18(3): 1-13.
|
[15] |
朱辉, 黄煜坤, 王枫为 ,等. 一种基于图形处理器的高吞吐量SM2 数字签名计算方案[J]. 电子与信息学报, 2022,44(10): 1-10.
|
|
ZHU H , HUANG Y K , WANG F W ,et al. A high throughput SM2 digital signature computing scheme based on graphics processor[J]. Journal of Electronics and Information Technology, 2022,44(10): 1-10.
|
[16] |
LONGA P , GEBOTYS C . Efficient techniques for high-speed elliptic curve cryptography[C]// International Workshop on Cryptographic Hardware and Embedded Systems. Heidelberg, 2010: 80-94.
|
[17] |
COHEN H , MIYAJI A , ONO T . Efficient elliptic curve exponentiation using mixed coordinates[C]// International Conference on the Theory and Application of Cryptology and Information Security. 1998: 51-65.
|
[18] |
SETIADI I , KISTIJANTORO A I , MIYAJI A . Elliptic curve cryptography:Algorithms and implementation analysis over coordinate systems[C]// 2015 2nd International Conference on Advanced Informatics:Concepts,Theory and Applications (ICAICTA). 2015: 1-6.
|
[19] |
LONGA P , MIRI A . Fast and flexible elliptic curve point arithmetic over prime fields[J]. IEEE Transactions on Computers, 2008,57(3): 289-302.
|
[20] |
HANKERSON D , MENEZES A J , VANSTONE S . Guide to elliptic curve cryptography[M]. Springer Science & Business Media, 2006.
|
[21] |
ISLAM M M , HOSSAIN M S , HASAN M K ,et al. FPGA implementation of high-speed area-efficient processor for elliptic curve point multiplication over prime field[J]. IEEE Access, 2019,7: 178811-178826.
|
[22] |
国家密码管理局. SM3 密码杂凑算法:GMT 0004.4-2012[S]. 北京:中国标准出版社, 2012:8.
|
|
National Cryptography Administration. SM3 password hashing algorithm:GMT 0004.4-2012[S]. Beijing:Standards Press of China, 2012:8.
|
[23] |
RIVAIN M . Fast and regular algorithms for scalar multiplication over elliptic curves[J]. Cryptology ePrint Archive, 2011.
|
[24] |
GURA N , Patel A , Wander A ,et al. Comparing elliptic curve cryptography and RSA on 8-bit CPUs[C]// International Workshop on Cryptographic Hardware and Embedded Systems. 2004: 119-132.
|
[25] |
Advanced Micro Devices,Inc. AMD graphic core next[R]. Advanced Micro Devices,Inc, 2011.
|
[26] |
DUSSE S R , KALISKI B S . A cryptographic library for the Motorola DSP56000[C]// Workshop on the Theory and Application of Cryptographic Techniques. 1990: 230-244.
|
[27] |
MUIR J , STINSON D . Minimality and other properties of the width-? nonadjacent form[J]. Mathematics of Computation, 2006,75(253): 369-384.
|
[28] |
国家密码管理局. SM2椭圆曲线公钥密码算法第5部分:参数定义:GMT 0003.4-2012[S]. 北京:中国标准出版社, 2012.
|
|
National Cryptography Administration. SM2 Elliptic curve public key cryptography algorithm Part 5:Parameter definition:GMT 0003.4-2012[S]. Beijing:Standards Press of China, 2012.
|
[29] |
闫闵 . 基于GPU的SM2数字签名和验证算法的快速实现与优化[D]. 上海:上海交通大学, 2020.
|
|
YAN M . Fast implementation and optimization of SM2 digital signature and verification algorithm based on GPU[D]. Shanghai:Shanghai Jiaotong University, 2020.
|