최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기전기전자학회논문지 = Journal of IKEEE, v.25 no.1, 2021년, pp.174 - 179
양현준 (School of Electronic Engineering, Kumoh National Institute of Technology) , 신경욱 (School of Electronic Engineering, Kumoh National Institute of Technology)
An Edwards curve cryptography (EdCC) core supporting point scalar multiplication (PSM) on Edwards curves of Edwards25519 and Edwards448 was designed. For area-efficient implementation, finite field multiplier based on word-based Montgomery multiplication algorithm was designed, and the extended twis...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
Victor S. Miller, "Use of Elliptic Curves in Cryptography," In Lecture notes in computer sciences; 218 on Advances in cryptology-CRYPTO 85, pp.417-426, 1986.
Harold M. Edwards, "A normal form for elliptic curves," Bulletin of the American Mathematical Society, Vol.44, Vol.3, pp.393-422, 2007. DOI: 10.1090/S0273-0979-07-01153-6
D. J. Bernstein, P. Birkner, M. Joye, T. Lange, and C. Peters. "Twisted Edwards curves," In Progress in Cryptology, - AFRICACRYPT 2008, vol.5023 of Lecture Notes in Computer Science, pp.389-405. Springer Verlag, 2008.
Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter and Ed Dawson "Twisted Edwards Curves Revisited," AFRICACRYPT 2008: Advances in Cryptology, pp.326-343, 2008.
Byung-Yoon Sung, "A Lightweight Public-key Cryptography Processor Integrating ECC and RSA into a Unified Hardware," Master Thesis, Kumoh National Institute of Technology, 2018.
Lily Chen (NIST), Dustin Moody (NIST), Andrew Regenscheid (NIST), Karen Randall (Randall Consulting), "Recommendations for Discrete Logarithm-Based Cryptography: Elliptic Curve Domain Parameters," SP 800-186 (draft), 2019.
Sang-Hyun Lee, "A Lightweight ECC Processor Supporting Dual Field Elliptic curves of GF(p) and GF(2^m)," Master Thesis, Kumoh national Institute of Technology, 2019.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.