[1] |
姜久兴, 厚娇, 黄海 ,等. 低面积复杂度AES低熵掩码方案的研究[J]. 通信学报, 2019,40(5): 201-210.
|
|
JIANG J X , HOU J , HUANG H ,et al. Research on area-efficient low-entropy masking scheme for AES[J]. Journal on Communications, 2019,40(5): 201-210.
|
[2] |
RESCORLA E , MOZILLA . The transport layer security (TLS) protocol version 1.3:RFC8446[S]. IETF,(2018-08) [2020-03-07].
|
[3] |
KUDITHI T , SAKTHIVEL R . High-performance ECC processor architecture design for IoT security applications[J]. Journal of Supercomputing, 2019,75(1): 447-474.
|
[4] |
HOSSAIN M S , KONG Y , SAEEDI E ,et al. High-performance elliptic curve cryptography processor over NIST prime fields[J]. IET Computers & Digital Techniques, 2017,11(1): 33-42.
|
[5] |
LIU J W , GUAN Z Y , CHENG D X ,et al. A high speed VLSI implementation of 256-bit scalar point multiplier for ECC over GF (p)[C]// 2018 IEEE International Conference on Intelligence and Safety for Robotics. Piscataway:IEEE Press, 2018: 184-191.
|
[6] |
LEE J W , CHUNG S C , CHANG H C ,et al. Efficient power-analysis-resistant dual-field elliptic curve cryptographic processor using heterogeneous dual-processing-element architecture[J]. IEEE Transactions on Very Large Scale Integration Systems, 2014,22(1): 49-61.
|
[7] |
CHUNG S C , LEE J W , CHANG H C ,et al. A high-performance elliptic curve cryptographic processor over GF(p) with SPA resistance[C]// IEEE International Symposium on Circuits and Systems. Piscataway:IEEE Press, 2012: 1456-1459.
|
[8] |
AL-SOMANI T F . High-performance generic-point parallel scalar multiplication[J]. Arabian Journal for Science and Engineering, 2017,42(2): 507-512.
|
[9] |
JAVEED K , WANG X , SCOTT M . High performance hardware support for elliptic curve cryptography over general prime field[J]. Microprocessors & Microsystems, 2017,51(6): 331-342.
|
[10] |
王敏, 吴震 . 抗SPA 攻击的椭圆曲线NAF 标量乘实现算法[J]. 通信学报, 2012,33(Z1): 228-232.
|
|
WANG M , WU Z . Algorithm of NAF scalar multiplication on ECC against SPA[J]. Journal on Communications, 2012,33(Z1): 228-232.
|
[11] |
MOHAMED N , HASHIM M , HUTTER M . Improved fixed-base comb method for fast scalar multiplication[C]// Proceedings of the 5th International Conference on Cryptology. Berlin:Springer, 2012: 342-359.
|
[12] |
ZHANG N , CHEN Z , XIAO G . Efficient elliptic curve scalar multiplication algorithms resistant to power analysis[J]. Information Sciences, 2007,177(10): 2119-2129.
|
[13] |
徐明, 史量 . 基于伪四维投射坐标的多基链标量乘法[J]. 通信学报, 2018,39(5): 74-84.
|
|
XU M , SHI L . Pseudo 4D projective coordinate-based multi-base scalar multiplication[J]. Journal on Communications, 2018,39(5): 74-84.
|
[14] |
IEEE Standards Association . IEEE standard specifications for public-key cryptography:IEEE Std 1363-2000[S]. IEEE,(2000-07) [2020-05-06].
|
[15] |
LI W , ZENG X Y , FENG X . A high-throughput processor for dual-field elliptic curve cryptography with power analysis resistance[C]// 2015 IEEE 15th International Conference on Scalable Computing and Communications and Its Associated Workshops. Piscataway:IEEE Press, 2015: 570-577.
|
[16] |
COHEN H , MIYAJI A , ONO T . Efficient elliptic curve exponentiation using mixed coordinates[C]// International Conference on the Theory& Applications of Cryptology & Information Security:Advances in Cryptology. Berlin:Springer, 1998: 51-65.
|
[17] |
王潮, 时向勇, 牛志华 . 基于蒙哥马利曲线改进 ECDSA 算法的研究[J]. 通信学报, 2010,31(1): 9-13.
|
|
WANG C , SHI X Y , NIU Z H . The research of the promotion for ECDSA algorithm based on Montgomery-form ECC[J]. Journal on Communications, 2010,31(1): 9-13.
|
[18] |
MARZOUQI H , AL-QUTAYRI M , SALAH K ,et al. A 65nm ASIC based 256 NIST prime field ECC processor[C]// 2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS). IEEE, 2016.
|
[19] |
MARZOUQI H , AL-QUTAYRI M , SALAH K . Review of elliptic curve cryptography processor designs[J]. Microprocessors and Microsystems, 2015,39(2): 97-112.
|
[20] |
HANKERSON D , MENEZES A , VANSTONE S . Guide to elliptic curve cryptography[M]. Berlin: Springer, 2004.
|
[21] |
BERNSTEIN D , . CURVE25519:new Diffie-Hellman speed records[C]// International Workshop on Public Key Cryptography, Berlin:Springer, 2006: 207-228.
|
[22] |
LANGLEY A , GOOGLE , Hamburg M ,et al. Elliptic curves for Security:RFC7748[S]. IETF,(2016-01) [2020-01-21].
|
[23] |
SALARIFARD R BAYAT-SARMADI S . An efficient low-latency point-multiplication over Curve25519[J]. IEEE Transactions on Circuits and Systems-I:Regular Papers, 2019,66(10): 3854-3862.
|
[24] |
DüELL M , HAASE B , HINTERWAELDER G ,et al. High-speed curve25519 on 8-bit,16-bit,and 32-bit microcontrollers[J]. Designs Codes & Cryptography, 2015,77(2-3): 493-514.
|
[25] |
CHEN Y L , LEE J W , LIU P C ,et al. A dual-field elliptic curve cryptographic processor with a radix-4 unified division unit[C]// IEEE International Symposium of Circuits and Systems. Piscataway:IEEE, 2011: 713-716.
|
[26] |
RASHIDI B . A survey on hardware implementations of elliptic curve cryptosystems[J]. arXiv Preprint,arXiv:1710.08336, 2017.
|