1 M. D. Shieh, "Word-Based Montgomery Modular Multiplication Algorithm for Low-Latency Scalable Architectures" 59 (59): 1145-1151, 2010
2 V. S. Miller, "Use of elliptic curve in cryptography" 417-426, 1986
3 F. Morain, "Speeding up the computations on an elliptic curve using addition-subtraction chains" 24 (24): 531-543, 1990
4 P. L. Montgomery, "Speeding the Pollard and elliptic curve methods of factorization" 48 (48): 243-264, 1987
5 K.C.C. Loi, "Scalable elliptic curve cryptosystem FPGA processor for NIST prime curves" 23 (23): 2753-2756, 2015
6 "NIST Std. FIPS PUB 186-2, Digital Signature Standard (DSS)"
7 "NIST Std. FIPS PUB 140-2, Security Requirements for Cryptographic Modules"
8 "IEEE Std. IEEE 1609.2, IEEE Standard for Wireless Access in Vehicular Environments-Security Services for Applications and Management Messages"
9 M.S. Hossain, "High-performance elliptic curve cryptography processor over NIST prime fields" 11 (11): 33-42, 2016
10 M.S. Hossain, "High-Performance FPGA Implementation of Modular Inversion over F_256 for Elliptic Curve Cryptography" 169-174, 2015
1 M. D. Shieh, "Word-Based Montgomery Modular Multiplication Algorithm for Low-Latency Scalable Architectures" 59 (59): 1145-1151, 2010
2 V. S. Miller, "Use of elliptic curve in cryptography" 417-426, 1986
3 F. Morain, "Speeding up the computations on an elliptic curve using addition-subtraction chains" 24 (24): 531-543, 1990
4 P. L. Montgomery, "Speeding the Pollard and elliptic curve methods of factorization" 48 (48): 243-264, 1987
5 K.C.C. Loi, "Scalable elliptic curve cryptosystem FPGA processor for NIST prime curves" 23 (23): 2753-2756, 2015
6 "NIST Std. FIPS PUB 186-2, Digital Signature Standard (DSS)"
7 "NIST Std. FIPS PUB 140-2, Security Requirements for Cryptographic Modules"
8 "IEEE Std. IEEE 1609.2, IEEE Standard for Wireless Access in Vehicular Environments-Security Services for Applications and Management Messages"
9 M.S. Hossain, "High-performance elliptic curve cryptography processor over NIST prime fields" 11 (11): 33-42, 2016
10 M.S. Hossain, "High-Performance FPGA Implementation of Modular Inversion over F_256 for Elliptic Curve Cryptography" 169-174, 2015
11 M. Amara, "Hardware implementation of Elliptic Curve Point Multiplication over GF(2^m) for ECC protocols" 2 (2): 106-112, 2012
12 N. Koblitz, "Elliptic curve cryptosystems" 48 (48): 203-209, 1987
13 J. Guajardo, "Efficient hardware implementation of finite fields with applications to cryptography" 93 : 75-118, 2006
14 D. Karakoyunlu, "Efficient and side-channel-aware implementations of elliptic curve cryptosystems over prime fields" 4 (4): 30-43, 2010
15 W. Stallings, "Cryptography and Network Security: Principles and Practice, 5th ed" Prentice-Hall 2010
16 H. Marzouqi, "An FPGA implementation of NIST 256 prime field ECC processor" 493-496, 2013
17 J. Bosmans, "A tiny coprocessor for elliptic curve cryptography over the 256-bit NIST prime field" 523-528, 2016
18 R. Rivest, "A method for obtaining Digital Signatures and Public-Key Cryptosystems" 21 (21): 120-126, 1978
19 박병관, "233-비트 이진체 타원곡선을 지원하는 암호 프로세서의 저면적 구현" 한국정보통신학회 21 (21): 1267-1275, 2017
20 박병관, "224-비트 소수체 타원곡선을 지원하는 공개키 암호 프로세서의 저면적 구현" 한국정보통신학회 21 (21): 1083-1091, 2017