[图书][B] Handbook of finite fields

GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …

Low-complexity bit-parallel canonical and normal basis multipliers for a class of finite fields

CK Koc, B Sunar - IEEE transactions on computers, 1998 - ieeexplore.ieee.org
We present a new low-complexity bit-parallel canonical basis multiplier for the field GF (2m)
generated by an all-one-polynomial. The proposed canonical basis multiplier requires …

Bit-parallel finite field multiplier and squarer using polynomial basis

H Wu - IEEE Transactions on Computers, 2002 - ieeexplore.ieee.org
Bit-parallel finite field multiplication using polynomial basis can be realized in two steps:
polynomial multiplication and reduction modulo the irreducible polynomial. In this article, we …

A new approach to subquadratic space complexity parallel multipliers for extended binary fields

H Fan, MA Hasan - IEEE Transactions on Computers, 2007 - ieeexplore.ieee.org
Based on Toeplitz matrix-vector products and coordinate transformation techniques, we
present a new scheme for subquadratic space complexity parallel multiplication in GF (2 n) …

A new construction of Massey-Omura parallel multiplier over GF (2/sup m/)

A Reyhani-Masoleh, MA Hasan - IEEE Transactions on …, 2002 - ieeexplore.ieee.org
The Massey-Omura multiplier of GF (2/sup m/) uses a normal basis and its bit parallel
version is usually implemented using m identical combinational logic blocks whose inputs …

An efficient optimal normal basis type II multiplier

B Sunar, CK Koç - IEEE Transactions on Computers, 2001 - ieeexplore.ieee.org
This paper presents a new parallel multiplier for the Galois field GF (2/sup m/) whose
elements are represented using the optimal normal basis of type II. The proposed multiplier …

[图书][B] Wireless security and cryptography: specifications and implementations

N Sklavos, M Manninger, X Zhang, O Koufopavlou… - 2017 - taylorfrancis.com
As the use of wireless devices becomes widespread, so does the need for strong and
secure transport protocols. Even with this intensified need for securing systems, using …

Finite field multiplier using redundant representation

H Wu, MA Hasan, IF Blake… - IEEE Transactions on …, 2002 - ieeexplore.ieee.org
This article presents simple and highly regular architectures for finite field multipliers using a
redundant representation. The basic idea is to embed a finite field into a cyclotomic ring …

Design and implementation of a private and public key crypto processor and its application to a security system

HW Kim, S Lee - IEEE Transactions on Consumer Electronics, 2004 - ieeexplore.ieee.org
This paper presents the design and implementation of a crypto processor, a special-purpose
microprocessor optimized for the execution of cryptography algorithms. This crypto …

Parallel multipliers based on special irreducible pentanomials

F Rodriguez-Henriguez, ÇK Koç - IEEE Transactions on …, 2003 - ieeexplore.ieee.org
The state-of-the-art Galois field GF (2/sup m/) multipliers offer advantageous space and time
complexities when the field is generated by so special irreducible polynomial. To date, the …