[1] |
MILLER V S. Use of Elliptic Curves in Cryptography[EB/OL]. , 1985.
|
[2] |
KOBLITZ N.Elliptic curve cryptosystems[J]. Mathematics of computation, 1987, 48(177): 203-209.
|
[3] |
BERNSTEIN D J, LANGGE T.Failures in NIST’s ECC Standards[EB/OL]., 2015.
|
[4] |
BERNSTEIN D J.Curve25519: New Diffie-Hellman Speed Records[EB/OL]. , 2006.
|
[5] |
LANGLEY A, HANBURG M.Elliptic Curves For Security[J].Order, 2016(500): 39081.
|
[6] |
BERNSTEIN D J.25519 Naming[EB/OL]., 2014
|
[7] |
VIEGA J, MESSIER M, CHANDRA P.Network Security with OpenSSL: Cryptography forSecure Communications[M]. New York: “O’Reilly Media, Inc.”, 2002.
|
[8] |
DÜLL M, HAASE B, HINTERWǞLDER G,et al. High-Speed Curve25519 on 8-bit, 16-bit, and 32-bit Microcontrollers[J]. Designs, Codes and Cryptography, 2015, 77(2-3): 493-514.
|
[9] |
FAZ-HERNÁNDEZ A, LÓPEZ J. Fast Implementation of Curve25519 Using AVX2[EB/OL]. .1007/978-3-319-22174-8_18, 2015.
|
[10] |
MAHE E, CHAUVET J M.Fast GPGPU-Based Elliptic Curve Scalar Multiplication[J]. IACR Cryptology ePrint Archive, 2014(1): 198.
|
[11] |
BERNSTEIN D J, CHEN T R, CHENG C M, et al. ECM on Graphics Cards[EB/OL]. ,2009.
|
[12] |
BERNSTEIN D J, CHEN HC, CHEN MS, et al.The Billion-Mulmod-Per-Second PC[EB/OL]., 2009.
|
[13] |
GIORGI P, IZARD T, TISSERAND A.Comparison of Modular Arithmetic Algorithms on GPUs[EB/OL]., 2009.
|
[14] |
ANTÃO S, BAJARD Jean-Claude, and SOUSA Leonel. Elliptic Curve Point Multiplication on GPUs[EB/OL]. , 2010.
|
[15] |
PU S, LIU J C. EAGL: an Elliptic Curve Arithmetic GPU-Based Library for Bilinear Pairing[EB/OL]., 2013.
|
[16] |
SZERWINSKI R,GÜNEYSU T. Exploiting the Power of GPUs for Asymmetric Cryptography[J]. Cryptographic Hardware and Embedded Systems-CHES2008(1):79-99.
|
[17] |
PAN W, ZHENG F, ZHAO Y, et al.An Efficient Elliptic Curve Cryptography Signature Server with GPU Acceleration[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(1): 111-122.
|
[18] |
BROWN M, HANKERSON D, LÓPEZ J, et al. Software Implementation of the NIST Elliptic Curves over Prime Fields[J]. Topics in Cryptology—CT-RSA2001(1):250-265.
|
[19] |
ZHANG D, BAI G. High-Performance Implementation of SM2 Based on FPGA[EB/OL]., 2016.
|
[20] |
MONTGOMERY P L.Speeding the Pollard and Elliptic Curve Methods of Factorization[J]. Mathematics of computation, 1987, 48(177): 243-264.
|
[21] |
BERNSTEIN D J, BIRKNER P, JOYE M, et al. Twisted Edwards Curves[EB/OL]., 2008.
|
[22] |
BERNSTEIN D J, LANGE T. FasterAddition and Doubling on Elliptic Curves[EB/OL], 2007.
|
[23] |
NVIDIA C. CUDA C Programming Guide[EB/OL]., 2013-6-23.
|
[24] |
ZHENG F, PAN W, LIN J, et al. Exploiting the Potential of GPUs for Modular Multiplication in ECC[EB/OL]., 2014.
|