References
- P. Choi, S. Lee, and D. K. Kim, "Design of efficient modular inversion module using resource sharing," Multimedia Information Technology and Applications, 2015, MITA 2015, 11th KMMS International Conference on, pp.298-299, Jun., 2015.
- P. Choi, J.-T. Kong, and D. K. Kim, "Analysis of hardware modular inversion modules for elliptic curve cryptography," International SoC Design Conference, 2015, ISOCC 2015, pp.313-314, Nov., 2015.
- E. Barker and A. Roginsky, "NIST Special Publication 800-131A Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths," ed: NIST, 2011.
- T. Güneysu and C. Paar, "Ultra high performance ECC over NIST primes on commercial FPGAs," Cryptographic Hardware and Embedded Systems, 2008, CHES 2008, ed: Springer, pp.62-78, 2008.
- B. MuthuKumar and S. Jeevananthan, "High speed hardware implementation of an elliptic curve cryptography (ECC) co-processor," Trendz in Information Sciences & Computing, 2010, TISC 2010, pp.176-180, 2010.
- G. Chen, G. Bai, and H. Chen, "A dual-field elliptic curve cryptographic processor based on a systolic arithmetic unit," Circuits and Systems, 2008, ISCAS 2008, IEEE International Symposium on, pp.3298-3301, 2008.
- J.-Y. Lai and C.-T. Huang, "Elixir: High-throughput cost-effective dual-field processors and the design framework for elliptic curve cryptography," Very Large Scale Integration (VLSI) Systems, IEEE Transactions on, Vol.16, pp.1567-1580, 2008. https://doi.org/10.1109/TVLSI.2008.2001239
- J.-Y. Lai and C.-T. Huang, "A highly efficient cipher processor for dual-field elliptic curve cryptography," Circuits and Systems II: Express Briefs, IEEE Transactions on, Vol.56, pp. 394-398, 2009. https://doi.org/10.1109/TCSII.2009.2019327
- J.-Y. Lai and C.-T. Huang, "Energy-adaptive dual-field processor for high-performance elliptic curve cryptographic applications," Very Large Scale Integration (VLSI) Systems, IEEE Transactions on, Vol.19, pp.1512-1517, 2011. https://doi.org/10.1109/TVLSI.2010.2048134
- D. Hankerson, A. J. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography: Springer Science & Business Media, 2006.
- P. Gallagher and C. Kerry, "Fips pub 186-4: Digital signature standard, dss," ed: NIST, 2013.
- N. Takagi, "A modular inversion hardware algorithm with a redundant binary representation," Information and Systems, IEICE Transactions on, Vol.76, pp.863-869, 1993.
- X. Yan and S. Li, "Modified modular inversion algorithm for VLSI implementation," 7th International Conference on ASIC, pp.90-93, 2007.
- C. Chen and Z. Qin, "Fast algorithm and hardware architecture for modular inversion in GF (p)," Intelligent Networks and Intelligent Systems, 2009, ICINIS 2009, 2nd International Conference on, pp.43-45, 2009.
- S. Ma, Y. Hao, Z. Pan, and H. Chen, "Fast implementation for modular inversion and scalar multiplication in the elliptic curve cryptography," Intelligent Information Technology Application, 2008, IITA 2008, 2nd International Symposium on, pp.488-492, 2008.
- R. Lorencz, "New algorithm for classical modular inverse," in Cryptographic Hardware and Embedded Systems, 2002, CHES 2002, ed: Springer, pp. 57-70, 2002.
- J. Hlavac and R. Lorencz, "Arithmetic unit for computations in GF (p) with the left-shifting multiplicative inverse algorithm," Architecture of Computing Systems, 2013, ARCS 2013, ed: Springer, pp.268-279, 2013.
- L. Hars, "Modular inverse algorithms without multiplications for cryptographic applications," Embedded Systems, EURASIP Journal on, Vol.2006, pp.1-13, 2006.
- D. Galbi and A. K. Chan, "Four-to-two adder cell for parallel multiplication," ed: Google Patents, 1990.