Cryptographic Machines With N-state Lab-transformed Switching Devices

作者: Peter Lablans

DOI:

关键词:

摘要: N-state switching tables are transformed by a Lab-transform into Lab-transformed n-state table. Memory devices, processors and combinational circuits with inputs an output characterized the table perform operations between physical states in accordance The devices applied cryptographic devices. standard that modified Lab-transform.

参考文章(20)
Jung Hee Cheon, Hyo Jin Yoon, Seon Young Lee, Jung Hoon Sohn, Hyung Tae Lee, Method and system for ID-based encryption and decryption ,(2013)
C.K. Koc, T. Acar, Fast software exponentiation in GF(2/sup k/) symposium on computer arithmetic. pp. 225- 231 ,(1997) , 10.1109/ARITH.1997.614899
Sean M. Gulley, Wajdi K. Feghali, James D. Guilford, Vinodh Gopal, Kirk S. Yap, Erdinc Ozturk, Martin G. Dixon, Gilbert M. Wolrich, Method and apparatus to process sha-2 secure hashing algorithm ,(2012)
Don Johnson, Alfred Menezes, Scott Vanstone, The Elliptic Curve Digital Signature Algorithm (ECDSA) International Journal of Information Security. ,vol. 1, pp. 36- 63 ,(2001) , 10.1007/S102070100002