[1] |
Miller V S. Use of elliptic curves in cryptography[C]. Berlin:Conference on the Theory and Application of Cryptographic Techniques, 1985:41-46.
|
[2] |
Koblitz N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987, 48(7):203-209.
doi: 10.1090/mcom/1987-48-177
|
[3] |
Johnson D, Menezes A, Vanstone S. The elliptic curve digital signature algorithm[J]. International Journal of Information Security, 2001, 1(1):36-63.
doi: 10.1007/s102070100002
|
[4] |
Brown M, Hankerson D, López J, et al. Software implementation of the NIST elliptic curves over prime fields[C]. Berlin:Cryptographers’Track at the RSA Conference, 2001:20-24.
|
[5] |
李复才, 张永平, 孙宁. 椭圆曲线数字签名方案的研究与改进[J]. 计算机工程与设计, 2007, 28(21):5241-5242.
|
|
Li Fucai, Zhang Yongping, Sun Ning. Study and improvement of signing schedules with elliptic curve cryptography[J]. Computer Engineering and Design, 2007, 28(21):5241-5242.
|
[6] |
张庆胜, 郭宝安, 徐树民, 等. 快速椭圆曲线签名验证算法[J]. 计算机工程与设计, 2008, 29(17):4425-4427.
|
|
Zhang Qingsheng, Guo Baoan, Xu Shumin, et al. Fast elliptic curve digital signature and verify algorithm[J]. Computer Engineering and Design, 2008, 29(17):4425-4427.
|
[7] |
Rashidi B, Farashahi R R, Sayedi S M. High-performance and high-speed implementation of polynomial basis ItohTsujii inversion algorithm over GF(2m)[J]. IET Information Security, 2017, 11(2):66-77.
doi: 10.1049/ise2.v11.2
|
[8] |
Rashidi B. Low-cost and fast hardware implementations of point multiplication on binary edwards curves[C]. Mashhad: Iranian Conference on Electrical Engineering, 2018:63-71.
|
[9] |
Kalaiarasi M, Venkatasubramani V R, Rajaram S. A Hex Itoh-Tsujii inversion algorithm for FPGA platforms[J]. IEICE Electronics Express, 2021, 18(9):1-8.
|
[10] |
戈勇, 李华, 宁永成. 基于FPGA的DES加密算法实现[J]. 电子科技, 2013, 26(7):172-176.
|
|
Ge Yong, Li Hua, Ning Yongcheng. The implementation of DES algorithm based on FPGA[J]. Electronic Science and Technology, 2013, 26(7):172-176.
|
[11] |
Qiang Z, Zhen Y. Research and implementation of poi-nt multiplication over elliptic curve GF(2m) based onVLSI[M]. Singapore:Springer, 2021:81-84.
|
[12] |
Hauksdóttir A S, Sigursson S. Proving routh's theorem using the euclidean algorithm and cauchy's theorem[J]. IFAC-Papers On Line, 2020, 53(2):4460-4467.
|
[13] |
Khan Z, Benaissa M. High speed and low latency ECC implementation over GF(2m) on FPGA[J]. IEEE Transactions on Very Large Scale Integration Systems, 2016, 25(1):165-176.
doi: 10.1109/TVLSI.2016.2574620
|
[14] |
Harb S S, Ahmad M O, Swamy M N S. High-performance pipelined FPGA implementation of the elliptic curve cryptography over GF(2n)[C]. Guangzhou: The Sixteenth International Conference on Security and Cryptography, 2019:33-38.
|
[15] |
Liu S G, Chen W Q, Liu J L. An efficient double parameter elliptic curve digital signature algorithm for blockchain[J]. IEEE Access, 2021(9):77058-77066.
|
[16] |
伍红梅. 基于椭圆曲线的ELGamal数字签名方案[J]. 楚雄师范学院学报, 2010(3):44-47.
|
|
Wu Hongmei. ELGamal digital signature scheme based on the elliptic curves[J]. Journal of Chuxiong Normal University, 2010, 25(3):44-47.
|
[17] |
Rashid M, Imran M, Jafri A R, et al. Through put/area optimised pipelined architecture for elliptic curve crypto processor[J]. IET Computers & Digital Techniques, 2019, 13(5):361-368.
doi: 10.1049/cdt2.v13.5
|
[18] |
Rebeiro C, Roy S S, Mukhopadhyay D. Pushing the limits of high-speed GF (2m)elliptic curve scalar multiplication on FPGAs[C]. Berlin:International Workshop on Cryptographic Hardware and Embedded Systems, 2012:57-63.
|