Prev    Up    Next  

Literatur

[ANS05]    Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). American National Standard for Financial Services X9.62, ANSI, September 2005.

[BB87]    BOJANCZYK, A. und R. P. BRENT: A systolic algorithm for extended GCD computation. Computers & Mathematics with Applications, 14(4):233–238, 1987.

[Ber84]    BERLEKAMP, ELWYN R.: Algebraic Coding Theory, Revised 1984 Edition. Aegean Park Press, Laguna Hills, CA, 1984.

[BK83]    BRENT, R. P. und H. T. KUNG: Systolic VLSI arrays for linear time GCD computation. In: ANCEAU, F. und E. J. AAS (Herausgeber): Proceedings of International Conference on Very Large Scale Integration (VLSI 83), Seiten 145–154. International Federation of Information Processing, Elsevier Science Publishers B.V., 1983.

[Bos96]    BOSCH, SIEGFRIED: Algebra. Springer, Berlin, 1996.

[Bun08]    BUNDSCHUH, PETER: Einführung in die Zahlentheorie. Springer, Berlin Heidelberg, 6. Auflage, 2008.

[CP05]    CRANDALL, RICHARD und CARL POMERANCE: Prime Numbers. A Computational Perspective. Springer, 2. Auflage, 2005.

[DK91]    DUSSé, STEPHEN R. und BURTON S. KALISKI, JR.: A Cryptographic Library for the Motorola DSP56000. In: Advances in Cryptology — EUROCRYPT ’90, Band 473 der Reihe Lecture Notes in Computer Sciences, Seiten 230–244, New York, 1991. Springer.

[DM11]    D. MCGREW, K. IGOE, M. SALTER: Fundamental Elliptic Curve Cryptography Algorithms. RFC 6090, IETF, Februar 2011.

[FHLM04]   FONG, K., D. HANKERSON, J. LOPEZ und A. MENEZES: Field inversion and point halving revisited. IEEE Trans. Comput., 53(8):1047–1059, August 2004.

[Gar59]    GARNER, HARVEY L.: The Residue Number System. IRE Transactions on Electronic Computers, 8(2):140–147, Juni 1959.

[Har06]    HARS, LASZLO: Modular Inverse Algorithms Without Multiplications for Cryptographic Applications. EURASIP Journal on Embedded Systems, 2006.

[HMV04]    HANKERSON, DARREL, ALFRED MENEZES und SCOTT VANSTONE: Guide to Elliptic Curve Cryptography. Springer, New York, 2004.

[IEE00]    Standard Specifications For Public-Key Cryptography. Std 1363-2000, IEEE, 2000.

[Jeb93]    JEBELEAN, TUDOR: Systolic Normalization of Rational Numbers. In: DADDA, L. und B. WAH (Herausgeber): ASAP’93 — International Conference on Application Specific Array Processors, Seiten 502–513, Venice, Italy, Oktober 1993. IEEE Computer Society Press. Also: Technical Report 93-45, RISC-Linz, Johannes Kepler University, Linz, Austria, August 1993.

[KAK96]    KOç, ÇETIN KAYA, TOLGA ACAR und BURTON S. KALISKI, JR.: Analyzing and Comparing Montgomery Multiplication Algorithms. IEEE Micro, 16(3):26–33, Juni 1996.

[Kal95]    KALISKI, JR., BURTON S.: The Montgomery Inverse and Its Applications. IEEE Transactions on Computers, 44(8):1064–1065, August 1995.

[Knu98]    KNUTH, DONALD E.: Seminumerical Algorithms, Band 2 der Reihe The Art of Computer Programming. Addison-Wesley, Reading, Massachusetts, 3. Auflage, 1998.

[Koç94a]    KOç, Ç. K.: Montgomery Reduction with Even Modulus. IEE Proceedings on Computers and Digital Techniques, 141(5):314–316, September 1994.

[Koç94b]    KOç, ÇETIN KAYA: High-Speed RSA Implementation. Technischer Bericht TR-201, RSA Laboratories, 1994. Version 2.0.

[Kör88]    KöRNER, T.W.: Fourier Analysis. Cambridge University Press, 1988.

[Mon85]    MONTGOMERY, P.: Modular multiplication without trial division. Mathematics of Computation, 44(170):519–521, 1985.

[MvV92]    MENEZES, ALFRED J., P. C. VAN OORSCHOT und SCOTT A. VANSTONE: Handbook of applied cryptography. CRC Press Series on Discrete Mathematics and Its Application. CRC Press, 2. Auflage, 1992.

[NZM91]    NIVEN, I., H.S. ZUCKERMAN und H.L. MONTGOMERY: An Introduction to the Theory of Numbers. John Wiley & Sons, 5. Auflage, 1991.

[PD75]    POLLARD, HARRY und HAROLD G. DIAMOND: The Theory of Algebraic Numbers. The Mathmatical Association of America, 2. Auflage, 1975.

[PW72]    PETERSON, W. WESLEY und E. J. WELDON, JR.: Error-Correcting Codes. The MIT Press, Cambridge Massachusetts and London, England, 2. Auflage, 1972.

[Ros99]    ROSEN, KENNETH H.: Elementary Number Theory and Its Applications. Addison-Wesley, 4. Auflage, 1999.

[RSA78]    RIVEST, R. L., A. SHAMIR und L. M. ADLEMAN: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120–126, Februar 1978.

[Sch96]    SCHNEIER, BRUCE: Applied Cryptography. John Wiley & Sons, 2. Auflage, 1996.

[Sha73]    SHANKS, DANIEL: Five Number-theoretic Algorithms. In: ROBERT S. D. THOMAS, HUGH COWIE WILLIAMS (Herausgeber): Proceedings of the Second Manitoba Conference on Numerical Mathematics, Band VII der Reihe Congressus Numerantium, Seiten 51–70, Winnipeg, 1973. Utilitas Mathematica Publishing, Inc.

[Sho05]    SHOUP, VICTOR: A Computational Introduction to Number Theory and Algebra. Cambridge University Press, 2005.

[Ste67]    STEIN, J.: Computational problems associated with Racah algebra. Journal of Computational Physics, 1(3):397–405, 1967.

[Ton91]    TONELLI, ALBERTO: Bemerkung über die Auflösung quadratischer Congruenzen. Nachrichten von der Königlichen Gesellschaft der Wissenschaften und der Georg-Augusts-Universität zu Göttingen, Seiten 344–346, 1891.

[Wel01]    WELSCHENBACH, MICHAEL: Kryptographie in C und C++. Springer, Berlin Heidelberg New York, 2. Auflage, 2001.