Rosing. Implementing Elliptic Curve Cryptography: Source Code [online]. Manning Publications Co., no publication date provided [retrieved in May 2001]. Retrieved from the Internet: <URL: http://www.manning.com/Rosing/source.html> onb.c (dated Jun. 7, 1997). |
Agnew et al., “Arithmetic Operations in GF(2m)”, Journal of Cryptology, vol. 6, pp. 3-13 (1993). |
De Win et al., “A Fast Software Implementation for Arithmetic Operations in GF(2n)”, Advances in Cryptology—ASIACRYPT '96 : International Conference on the Theory and Applications of Cryptology and Information Security, pp. 65-76 (Nov. 3-7, 1996). |
Laws et al., “A Cellular-Array Multiplier for GF(2m)”, IEEE Transactions on Computers, vol. C-20, No. 12, pp. 1573-1578 (Dec. 1971). |
Menezes et al., “Elliptic Curve Cryptosystems and Their Implementation”, Journal of Cryptology, vol. 6, pp. 209-224 (1993). |
Menezes (ed.), Applications of Finite Fields, Kluwer Academic Publishers (1993). |
Menezes, Elliptic Curve Public Key Cryptosystems, Klunwer Academic Publishers, pp. 15-34 (1993). |
Morrii et al., “Efficient Construction of Gate Circuit for Computing Multiplicative Inverses over GF(2m)”, The Transactions of the IEICE, vol. 72, No. 1, pp. 37-42 (Jan. 1989). |
Nyberg, “Differentially Uniform Mappings for Cryptography”, Advances in Cryptology—EUROCRYPT '93: Workshop on the Theory & Application of Cryptographic Techniques, pp. 55-61 (May 23-27, 1993). |
Nyberg et al., “Provable Security Against a Differential Attack”, Journal of Cryptology, vol. 8, pp. 27-37 (1995). |
Oorschot et al., “A Geometric Approach to Root Finding in GF(qm)”, IEEE Transactions on Information Theory, vol. 35, No. 2, pp. 444-453 (Mar. 1989). |
Pekmestzi et al., “A Two's Complement Cellular Array Multiplier”, The Radio and Electronic Engineer, vol. 51, No. 2, pp. 94-96 (Feb. 1981). |
Pincin, “A New Algorithm for Multiplication in Finite Fields”, IEEE Transactions on Computers, vol. 38, No. 7, pp. 1045-1049 (Jul. 1989). |
Rosing, Implementing Elliptic Curve Cryptography, Manning Publications Co., pp. 47-127 (1999). |
Schneier, Applied Cryptography, 2nd ed., John Wiley & Sons, Inc., pp. 242-244 (1996). |
Wang et al., “VLSI Architectures for Computing Multiplications and Inverses in GF(2m)”, IEEE Transactions on Computers, vol. C-34, No. 8, pp. 709-717 (Aug. 1985). |
Yeh et al., “Systolic Multipliers for Finite Fields GF(2m)”, IEEE Transactions on Computers, vol. C-33, No. 4, pp. 357-360 (Apr. 1984). |