[1]
W. Diffie and M.E. Hellman: New Directions in Cryptography, IEEE Trans. on Information Theory, Vol. 22, No. 6 (1976), pp.644-654.
DOI: 10.1109/tit.1976.1055638
Google Scholar
[2]
N. Koblitz: Elliptic Curve Cryptosystems, Mathematics of Computation, Vol. 48, No. 177 (1987), pp.203-209.
DOI: 10.1090/s0025-5718-1987-0866109-5
Google Scholar
[3]
V.S. Miller: Use of Elliptic Curves in Cryptography, Advances in Cryptology - CRYPTO '85 (1986), pp.417-426.
DOI: 10.1007/3-540-39799-x_31
Google Scholar
[4]
J. Huang, H. Li, and P. Sweany: An FPGA Implementation of Elliptic Curve Cryptography for Future Secure Web Transaction, International Conference on Parallel and Distributed Computing Systems (2007), pp.296-301.
Google Scholar
[5]
J. Seberry and J. Pieprzyk, Cryptography: An Introduction to Computer Security, Prentice Hall. (1986).
Google Scholar
[6]
D. Hankerson, A. Menezes, and S. Vanstone, Guide to Elliptic Curves Cryptography, New York: Springer-Verlag Hall/CRC. (2004).
Google Scholar
[7]
IEEE 1363, Standard Specifications for Publickey Cryptography. (2000).
Google Scholar
[8]
NIST, Recommended elliptic curves for federal government use, URL: http: /csrc. nist. gov/encryption. (1999).
Google Scholar
[9]
T. Itoh and S. Tsujii: A Fast Algorithm for Computing Multiplicative Inverses in GF(2m) Using Normal Bases, Information and Computation, Vol. 78, No. 3 (1988), pp.171-177.
DOI: 10.1016/0890-5401(88)90024-7
Google Scholar
[10]
P.L. Montgomery: Speeding the pollard and elliptic curve methods of factorization, Mathematics of Computation, Vol. 48 (1987), pp.243-264.
DOI: 10.1090/s0025-5718-1987-0866113-7
Google Scholar
[11]
J. Lòpez and R. Dahab: Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation, Proc. First Int'l Workshop Cryptographic Hardware and Embedded Systems (1999), pp.316-327.
DOI: 10.1007/3-540-48059-5_27
Google Scholar
[12]
S. Sutikno, A. Surya, and R. Effendi: An Implementation of ElGamal Elliptic Curves Cryptosystems, IEEE Asia-Pacific Conference on Circuits and Systems (1998), pp.483-486.
DOI: 10.1109/apccas.1998.743829
Google Scholar
[13]
B. Ansari and M.A. Hasan: High performance architecture of elliptic curve scalar multiplication, Tech. Report CACR 2006-01. (2006).
Google Scholar
[14]
B. Ansari and M.A. Hasan: High-Performance Architecture of Elliptic Curve Scalar Multiplication, IEEE Trans. on Computers, Vol. 57, No. 11 (2008), pp.1443-1452.
DOI: 10.1109/tc.2008.133
Google Scholar
[15]
H.M. Choi, C.P. Hong, and C.H. Kim: High performance elliptic curve cryptographic processor over GF(2163), Proc. IEEE Int. Symposium on Electronic Design, Test, and Applications (DELTA) (2008), pp.290-295.
DOI: 10.1109/delta.2008.118
Google Scholar
[16]
J.Y. Lai, T.Y. Hung, and K.H. Yang: High-performance architecture for Elliptic Curve Cryptography over binary field, International Symposium on Circuits and Systems (ISCAS) (2010), pp.3933-3936.
DOI: 10.1109/iscas.2010.5537670
Google Scholar
[17]
Y. Zhang, D. Chen, Y. Choi, L. Chen, and S.B. Ko: A high performance pseudo-multi-core ECC processor over GF(2163), International Symposium on Circuits and Systems (ISCAS) (2010), pp.701-704.
DOI: 10.1109/iscas.2010.5537486
Google Scholar
[18]
H. Wu: Bit-parallel finite field multiplier and squarer using polynomial basis, IEEE Trans. on Computers, Vol. 51, No. 7 (2002), pp.750-758.
DOI: 10.1109/tc.2002.1017695
Google Scholar