共 19 条
- [1] Feng D., Zhang M., Zhang Y., Et al., Study on cloud computing security, Journal of Software, 22, 1, pp. 71-83, (2011)
- [2] Elbirt J., Chetwynd B., Paar C., Et al., An FPGA implementation and performance evaluation of the AES block cipher candidate algorithm finalist, Proc of the 3rd AES Conf (AES3), pp. 192-201, (2000)
- [3] P1619-2007 the XTS-AES Tweakable Block Cipher, (2008)
- [4] Ansari B., Hasan M., High performance architecture of elliptic curve scalar multiplication, CACR-2006-01, (2006)
- [5] Damgard I., Jurik M., A generalisation, a simplication and some applications of Paillier's probabilistic public-key system, Lecture Notes in Computer Science, 7, 45, pp. 119-136, (2001)
- [6] Bao K., Song Y., Optimizing and realization of the finite field inversion algorithm based on FPGA, Computer Engineering, 32, 23, pp. 156-159, (2006)
- [7] Paillier P., Public-key cryptosystems based on composite degree residuosity classes, LNCS 1592: Proc of Eurocrypt'99, pp. 223-238, (1999)
- [8] Choi S., Won D., Improvement of probabilistic public key cryptosystems using discrete logarithm, Proc of Int Conf on Information Security and Cryptology, pp. 72-80, (2001)
- [9] Gueron S., Efficient software implementations of modular exponentiation, Journal of Cryptographic Engineering, 9, 2, pp. 31-43, (2012)
- [10] Kazuhiko M., Improved security analysis of XEX and LRW modes, LNCS 4356: Proc of SAC 2006, pp. 96-113, (2007)