|
[1] W. Die and M. Hellman, "New directions in cryptography," in IEEE Transactions on Information Theory, vol. 22, pp. 644-654, Nov 1976. [2] J. Jonsson and B. Kaliski, Public-key cryptography standards (PKCS)# 1: RSA cryptography specications version 2.1, June 2002. [3] N. Koblitz, "Elliptic Curve Cryptosystems," in Mathematics of Computation, vol. 48, pp. 203-209, 1987. [4] IEEE, IEEE Std 1363-2000: Standard Specications for Public Key Cryptography, Jan. 2000. [5] ANSI X9.62-199x: Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), Sep. 1998. [6] Recommended Elliptic Curves for Federal Government Use, National Institute of Standards and Technology (NIST), July 1999. [7] SECG, SEC 2: Recommended Elliptic Curve Domain Parameters, Standards for Efficient Cryptography Group (SECG), Sep. 2000. [8] E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, Recommendation for key management{part 1: General (revision 3), National Institute of Standards and Technology (NIST), vol. 800, pp. 57, 2011. [9] V. Miller, "Uses of elliptic curves in cryptography," in Advances in Cryptology: proceedings of Crypto'85, Lecture Notes in Computer Science, vol. 218, pp. 417-426, 1986. [10] C. Schnorr, "Ecient Identication and Signatures for Smart Cards," in Advances in Cryptology: proceedings of Crypto89, Lecture Notes in Computer Science, vol. 435, pp. 239-252, Springer New York, 1990. [11] ISO/IEC 18000-3: Information Technology - Radio Frequency Identication (RFID) for Item Management - Part 3: Parameters for air interface communications at 13.56 MHz, 2004. [12] J. H. Lee, Y. C. Hsu, and Y. L. Lin, "LIP: A data-path scheduler using linear integer programming," in IEEE International Symposium on VLSI Technology, Systems and Applications,, pp. 247251, May 1989. [13] T. Itoh, and S. Tsujii, "A fast algorithm for computing multiplicative inverses in GF(2m) using normal bases" in Information and Computation, vol. 78, Issue 3, pp. 171-177, Sep. 1988. [14] J. Lopez and R. Dahab, "Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation," in Cryptographic Hardware and Embedded Systems (CHES) vol. 1717, pp. 316-327, Springer, Aug. 1999. [15] K. Sakiyama, L. Batina, N. Mentens, B. Preneel, and I. Verbauwhede, "Small-footprint ALU for Public-Key Processors for Pervasive Security, in Workshop on RFID Security, vol. 12, 2006. [16] H. Wu, "Bit-Parallel Finite Field Multiplier and Squarer Using Polynomial Basis," in IEEE Transactions on Computers, vol. 51, pp. 750-758, July 2002. [17] S. Kumar, and C. Paar, "Are standards compliant Elliptic Curve Cryptosystems feasible on RFID?" in Workshop on RFID Security, , pp. 12-14, July 2006. [18] L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, "An Elliptic Curve Processor Suitable For RFID-Tags." IACR Cryptology ePrint Archive, vol. 2006, pp. 227, 2006. [19] Y. K. Lee, K. Sakiyama, L. Batina, and I. Verbauwhede, "Elliptic-Curve-Based Security Processor for RFID," in IEEE Transactions on Computers, vol. 57, pp. 1514-1527, Nov. 2008. [20] P. Montgomery, "Speeding the Pollard and elliptic curve methods of factorization," in Mathematics of Computation, vol. 48, pp. 243-264, 1987. [21] M. Feldhofer, and J. Wolkerstorfer, "Strong Crypto for RFID Tags - A Compariosn of Low-Power Hardware Implementations," in IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1839-1842, 2007. [22] P. Luo, X. Wang, J. Feng, and Y. Xu, "Low-Power Hardware Implementation of ECC Processor suitable for Low-Cost RFID Tags," in Solid-State and Integrated Circuit Technology (ICSICT) pp. 1681-1684 Oct. 2008. [23] H. Bock, M. Braun, M. Dichtl, E. Hess, J. Heyszl, W. Kargl, H. Koroschetz, B. Meyer, and H. Seuschek, "A Milestone Towards RFID Products Oering Asymmetric Authentication Based on Elliptic Curve Cryptography," in Workshop on RFID Security, 2008. [24] Yueh Chang, "Energy Ecient Architecture for Elliptic Curve Cryptography over Binary Fields," Oct. 2011. [25] P.W. Chang, "Low-Cost Design for Elliptic Curve Cryptography over Binary Field," Nov. 2012. [26] L. Batina, N. Mentens, K. Sakiyama, B. Preneel, and I. Verbauwhede, "Public-Key Cryptography on the Top of a Needle," in IEEE International Symposium on Circuits and Systems (ISCAS), pp.1831-1834, 2007. [27] H.R. Ahmadi and A. Afzali-Kusha, "Low-Power Low-Energy Prime-Field ECC Processor Based on Montgomery Modular Inverse Algorithm", in Euromicro Conference on Digital System Design, Architectures, Methods and Tools (DSD), pp.817-822, 2009. [28] D. Hein, J. Wolkerstorfer, and N. Felber, "ECC is Ready for RFID - A Proof in Silicon," in Selected Areas in Cryptography, pp. 401{413, Springer, 2009. [29] U. Kocabas, J. Fan, and I. Verbauwhede, "Implementation of binary edwards curves for very-constrained devices," in IEEE International Conference on Application-specific Systems Architectures and Processors (ASAP), pp.185-191, 2010. [30] T. Kern, and M. Feldhofer, "Low-Resource ECDSA Implementation for Passive RFID Tags," in IEEE International Conference on Electronics, Circuit, and Systems (ICECS), pp. 1236-1239 Dec. 2010. |