参考文献[1]黎明,吴丹,戴葵,等.高性能可扩展公钥密码协处理器研究与设计[J].电子学报,2011,39(3):665-670. [2]王玉良.面向密码算法的粗粒度可重构结构研究与设计[D].郑州:解放军信息工程大学,2010. [3]李可长.基于FPGA可重构快速密码芯片设计[J].计算机测量与控制,2011,19(7):1665-1667. [4]杨晓辉.面向分组密码处理的可重构设计技术研究[D].郑州:解放军信息工程大学,2007. [5]Elbirt A J.Reconfigurable Computing for Symmetric-key Algorithms[D].Worcester,USA:Worcester Polytechnic Institute,2002. [6]Ravikumar K,Udhayakumar A.A Detailed Study of Elliptic Curve Cryptography Algorithm and Its Performance[J].International Journal of Engineering Science & Research Technology,2013,2(10):2960-2964. [7]Bluhm M,Gueron S.Fast Software Implementation of Binary Elliptic CurveCryptography[EB/OL].(2014-10-15).http://eprint.iacr.org/2013/741.pdf. [8]Ko K,Acar T,Kaliski B S.Analyzing and Comparing Montgomery Multiplication Algorithms[J].IEEE Micro,1996,16(3):26-33. [9]C-Sky Microsystems.Co.,Ltd..C-Sky CK810 User’s Manual[EB/OL].(2014-10-20).http://www.c-sky.com. [10]Moon S.Design of a Scalable RSA Cryptoprocessor Embedded with an Efficient MAC Unit[C]//Proceedings of the 2nd International Conference on Future Generation Communication and Networking.Washington D.C.,USA:IEEE Press,2008:74-77. [11]Chen Yunlu,Tseng Chih-Yeh,Chang Hsie-Chia.Design and Implementation of Reconfigurable RSA Cryptosys-tem[C]//Proceedings of International Symposium on VLSI Design,Automation and Test.Washington D.C.,USA:IEEE Press,2007:1-4. [12]Zhao Xuemi,Wang Zhiying,Yue Hong,et al.TTA-EC:A Whole Algorithm Processor for ECC Based on Transport Triggered Architecture[J].Chinese Journal of Computers,2007,30(2):225-233. [13]Liu Sining,Francis B,Brian K,et al.Elliptic Curves Cryptosystem Implementation Based on a Look-up Table Sharing Scheme[C]//Proceedings of International Symposium on Circuits and Systems.Washington D.C.,USA:IEEE Press,2006:2921-2924. 编辑顾逸斐 |