[1] AL-SOMANI T F, KHAN E A, QAMAR-UL-ISLAM A M, et al. Hardware/Software co-design implementation of elliptic curve ccryptosystems[J].Information Technology Journal,2009,8(4):403-410. [2] TAN F. High-speed coprocessor implementation of ECC algorithm[D].Xi'an: Xidian University, 2009. (谈飞洋.高速ECC算法协处理器设计[D]. 西安:西安电子科技大学,2009.) [3] ZHOU F, SHI Z, GUO W, et al. High parallel configurable elliptic curve cryptographic processor over GF(p) field[J]. Computer Engineering,2012,38(16):142-144. (周发旺,史再蜂,郭炜,等. 高并行可配置的GF(p)域ECC处理器[J]. 计算机工程,2012,38(16):142-144.) [4] XU J, WANG Z, YAN Y. HW/SW co-design of ECC ASIP[J]. Computer Engineering and Design, 2012,33(3):916-920.(徐劲松, 王志新, 严迎建. ECC专用指令处理器软硬件协同设计[J].计算机工程与设计, 2012, 33(3): 916-920.) [5] ZHANG L, CHEN J, HUANG Y, et al. Research and design of elliptic curve cryptosystem SoC[J]. Journal of Huazhong University of Science and Technology: Natural Science Edition, 2008,36(11):52-55.(张丽娜,陈建华,黄尹,等. 椭圆曲线密码SoC的研究与设计[J]. 华中科技大学学报:自然科学版,2008,36(11):52-55.) [6] SAKIYAMA K, BATINA L, PRENEEL B. HW/SW co-design for public-key cryptosystems on the 8051 micro-controller[J]. Computers and Electrical Engineering,2007,33(5/6):324-332. [7] State Cryptography Administration. Public key cryptographic algorithm SM2 based on elliptic curve[EB/OL]. [2010-12-10]. http://www.oscca.gov.cn/.(国家密码管理局. SM2椭圆曲线公钥密码算法总则[EB/OL].[2010-12-10]. http://www.oscca.gov.cn/.) [8] YOU Y. SoC design based on ESL design methodology[J]. China Integrated Circuit, 2011(9): 29-35.(游余新.基于ESL设计方法学的SoC设计[J].中国集成电路, 2011(9): 29-35.) [9] LI H. CHEN X. Electronic system level design based on SystemC[M].Beijing: Science Press, 2010:9-11.(李挥,陈曦.SystemC电子系统级设计[M].北京: 科学出版社,2010:9-11.) [10] HAU Y W, KHALIL-HANI M. SystemC-based HW/SW co-simulation platform for System-on-Chip (SoC) design space exploration[J]. International Journal of Information and Communication Technology, 2009,2(1/2):108-119. [11] HAU Y W, KHALIL-HANI M, MARSONO M N. SystemC-based hardware/software co-design of elliptic curve cryptographic system for network mutual authentication[J]. Malaysian Journal of Computer Science, 2011, 24(2):111-130. [12] SUN R, CAI C, ZHOU Z, et al. The comparision between digital signature based on SM2 and ECDSA[J]. Network Security Technology and Application, 2013(2):60-62.(孙荣燕,蔡昌曙,周洲,等.国密SM2数字签名算法与ECDSA算法对比分析研究[J].网络安全技术与应用, 2013(2):60-62.) |