提交 b99b1107 编写于 作者: B Bodo Möller

Add a pointer to a paper (is the algorithm in section 4.2 the

word-based algorithm we are using?)
上级 6e0cad8d
......@@ -57,9 +57,10 @@
*/
/*
* Details about Montgomery multiplication algorithms can be found at:
* http://security.ece.orst.edu/publications.html, especially
* http://security.ece.orst.edu/koc/papers/j37acmon.pdf
* Details about Montgomery multiplication algorithms can be found at
* http://security.ece.orst.edu/publications.html, e.g.
* http://security.ece.orst.edu/koc/papers/j37acmon.pdf and
* sections 3.8 and 4.2 in http://security.ece.orst.edu/koc/papers/r01rsasw.pdf
*/
#include <stdio.h>
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册