Active Bibliography

1 Montgomery Multiplication in GF(2^k) – Cetin K. Koc, Tolga Acar - 1998
Fast Bit-Level, Word-Level and Parallel Arithmetic in Finite Fields for Elliptic Curve Cryptosystems – Alper Halbutogullar - 1998
SEC 1: Elliptic . . . – n.n. - 2000
A Survey of Elliptic Curve Cryptosystems, Part I: Introductory – San C. Vo - 2003
1 Finite field Multiplier Architectures for Cryptographic Applications – Mohamed El-gebaly - 2000
14 Algorithms for Exponentiation in Finite Fields – Shuhong Gao, Joachim von zur Gathen, Daniel Panario, Victor Shoup - 2000
Public Key Cryptography For The Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography – unknown authors - 1999
unknown title – Foreword Whitfield Diffie
Chapter 1—Foundations 1.1 Terminology – Bruce Schneier, Wiley Computer Publishing, John Wiley, Whitfield Diffie
4 Applications of Exponential Sums in Communications Theory – Kenneth G. Paterson, Bristol Bs Qz - 1999
1 Feedback Shift Register Sequences – Hong-yeop Song
26 The Diffie-Hellman Protocol – Ueli M. Maurer, Stefan Wolf - 1999
38 The Relationship Between Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms – Ueli M. Maurer , Stefan Wolf - 1998
14 Fast Normal Basis Multiplication Using General Purpose Processors – Arash Reyhani-masoleh, M. A. Hasan - 2001
1 Dickson Bases and Finite Fields – Ronald C. Mullin, Ayan Mahalanobis
4 A New Aspect of Dual Basis for Efficient Field Arithmetic – Chang-Hyi Lee , Jong-In Lim - 1990
14 On Orders of Optimal Normal Basis Generators – Shuhong Gao, Scott A. Vanstone - 1995
Public Key Cryptography For The Financial Services Industry: The Elliptic . . . – n.n. - 1998
International Journal of Innovations in Engineering and Technology (IJIET) DESIGN OF WORD LEVEL MULTIPLICATION ALGORITHM ON REORDERED NORMAL BASIS – G. Yuvaraj