Michael E. Sone and Ndeh N. Ningo
[1] J. Proakis, Digital communications (New York, NY, USA:McGraw-Hill International Book Company, 2003). [2] D. Trinca, Sequential and Parallel Cascaded ConvolutionalEncryption with Local Propagation: toward Future Directionsin symmetric cryptography, Proc. of the 3rd InternationalConference on Information technology: New Generations, LasVegas, NV, 10–12 April, 2006, 446–469. [3] H. Nozaki, M. Motoyama, A. Shimbo, & S. Kawamura, Imple-mentation of RSA algorithm based on RNS Montgomery mul-tiplication, In Cryptographic Hardware and Embedded SystemsCHES 2001 (LNCS 2162), 2001, 364–376. [4] P.L. Montgomery, Modular multiplication without trial divi-sion, Mathematics of Computation, 44 (170), 1985, 519–521. [5] S.E. Eldridge & C.D. Walter, Hardware implementation ofMontgomery’s modular multiplication algorithm, IEEE Trans-actions on Computers, 42 (6), 1993, 693–699. [6] K. Salli, T. H¨am¨al¨ainen, J. Knuutila, & J. Saarinen, Securitydesign for a new wireless local area network TUTWLAN, TheNinth IEEE International Symposium on Personal, Indoor andMobile Radio Communications (PIMRC’98), Boston, USA,8–11 September, 1998, 1540–1544. [7] J. Bellardo & S. Savage, 802.11 denial-of-service attacks:real vulnerabilities and practical solutions, Usenix SecuritySymposium 03, Washington, DC, 4–8 August, 2003. [8] J. Edney & W.A. Arbaugh, Real 802.11 security: Wi-Fiprotected access and 802.11i (Boston, USA: Addison Wesley,2003), ISBN: 0-321-13620-9. [9] N. Szabo & R.I. Tanaka, Residue arithmetic and its applicationsto computer technology (New York, NY, USA: McGraw-HillBook Company, 1967). [10] F.J. Taylor, Residue arithmetic: a tutorial with examples,IEEE Computer, 17 (5), 1984, 50–60. [11] M. Soderstrand, W. Jenkins, G.A. Jullien, & F.J. Taylor,Residue number system arithmetic: modern applications in dig-ital signal processing, IEEE Press Reprint Series (Piscataway,NJ, USA: IEEE Press, 1986). [12] L.L. Yang & L. Hanzo, A residue number system based parallelcommunication scheme using orthogonal signaling: Part I –System outline, IEEE Transactions on Vehicular Technology,51 (6), 2002, 1534–1546. [13] N.N. Ningo & M.E. Sone, Efficient key management FPGA-based cryptosystem using the RNS and iterative coding, In-ternational Journal of Information and Communication Tech-nology, 2 (4), 2010, 302–322. [14] L.-L. Yang & L. Hanzo, Performance analysis of coded M-aryorthogonal signaling using errors-and-erasures decoding overfrequency selective fading channels, IEEE Journal on selectedAreas in communication, 19, 2001, 211–221.
Important Links:
Go Back