|
[1] W. Diffie and M. Hellman, “New directions in cryptography,” IEEE transactions on Information Theory, vol. 22, no. 6, pp. 644–654, 1976. [2] J. Jonsson, K. Moriarty, B. Kaliski, and A. Rusch, “Pkcs# 1: Rsa cryptography specifications version 2.2,” 2016. [3] N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of computation, vol. 48, no. 177, pp. 203–209, 1987. [4] V. S. Miller, “Use of elliptic curves in cryptography,” in Conference on the Theory and Application of Cryptographic Techniques. Springer, 1985, pp. 417–426. [5] E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, “Recommendation for key management part 1: General (revision 3),” NIST special publication, vol. 800, no. 57, pp. 1–147, 2012. [6] IEEE Std 1363-2000: IEEE Standard Specifications for Public-Key Cryptography. IEEE, 2000. [Online]. Available: https://books.google.com.tw/books?id=KKc8nQAACAAJ [7] ISO/IEC, 18000-3:2010 Information technology – Radio frequency identification for item management – Part 3: Parameters for air interface communications at 13,56 MHz, 2010. [8] D. Johnson, A. Menezes, and S. Vanstone, “The elliptic curve digital signature algorithm (ecdsa),” International Journal of Information Security, vol. 1, no. 1, pp. 36–63, 2001. [9] S. SEC, “2: Recommended elliptic curve domain parameters,” Standards for Efficient Cryptography Group, Certicom Corp, 2000. [10] J. López and R. Dahab, “Fast multiplication on elliptic curves over gf (2 m) without precomputation,” in Cryptographic Hardware and Embedded Systems. Springer, 1999, pp. 724–724. [11] National and N. I. S. T. Technology, Recommended elliptic curves for federal government use, 1999. [12] K. Sakiyama, L. Batina, B. Preneel, and I. Verbauwhede, “Multicore curve-based cryptoprocessor with reconfigurable modular arithmetic logic units over gf (2^ n),” IEEE Transactions on Computers, vol. 56, no. 9, 2007. [13] Y. K. Lee, K. Sakiyama, L. Batina, and I. Verbauwhede, “Elliptic-curve-based security processor for rfid,” IEEE Transactions on Computers, vol. 57, no. 11, pp. 1514–1527, 2008. [14] T. Itoh and S. Tsujii, “A fast algorithm for computing multiplicative inverses in gf (2m) using normal bases,” Information and computation, vol. 78, no. 3, pp. 171–177, 1988. [15] Y. Chang, “Energy efficient architecture for elliptic curve cryptography over binary fields,” Department of Computer Science, National Tsing Hua University, Oct. 2011. [16] P. Luo, X. Wang, J. Feng, and Y. Xu, “Low-power hardware implementation of ecc processor suitable for low-cost rfid tags,” in Solid-State and Integrated-Circuit Technology, 2008. ICSICT 2008. 9th International Conference on. IEEE, 2008, pp. 1681–1684. [17] M. Feldhofer and J. Wolkerstorfer, “Strong crypto for rfid tags-a comparison of low-power hardware implementations,” in Circuits and Systems, 2007. ISCAS 2007. IEEE International Symposium on. IEEE, 2007, pp. 1839–1842. [18] H. Bock, M. Braun, M. Dichtl, E. Hess, J. Heyszl, W. Kargl, H. Koroschetz, B. Meyer, and H. Seuschek, “A milestone towards rfid products offering asymmetric authentication based on elliptic curve cryptography,” Invited talk at RFIDsec, 2008. [19] D. M. Hein, J. Wolkerstorfer, and N. Felber, “Ecc is ready for rfid-a proof in silicon.” in Selected Areas in Cryptography, vol. 5381. Springer, 2008, pp. 401–413. |