提交 b99b1107 编写于 作者: B Bodo Möller

Add a pointer to a paper (is the algorithm in section 4.2 the

word-based algorithm we are using?)
上级 6e0cad8d
...@@ -57,9 +57,10 @@ ...@@ -57,9 +57,10 @@
*/ */
/* /*
* Details about Montgomery multiplication algorithms can be found at: * Details about Montgomery multiplication algorithms can be found at
* http://security.ece.orst.edu/publications.html, especially * http://security.ece.orst.edu/publications.html, e.g.
* http://security.ece.orst.edu/koc/papers/j37acmon.pdf * http://security.ece.orst.edu/koc/papers/j37acmon.pdf and
* sections 3.8 and 4.2 in http://security.ece.orst.edu/koc/papers/r01rsasw.pdf
*/ */
#include <stdio.h> #include <stdio.h>
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册