Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
10 | Yvo Desmedt, Duong Hieu Phan |
A CCA Secure Hybrid Damgård's ElGamal Encryption. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Onur Aciiçmez, Werner Schindler |
A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
Instruction-Cache Attack, MicroArchitectural Analysis, RSA, Stochastic Process, Side Channel Analysis, Montgomery Multiplication |
10 | Nadia Nedjah, Luiza de Macedo Mourelle |
Evolutionary Public-Key Cryptographic Circuits. |
IEA/AIE |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Yumi Sakemi, Yasuyuki Nogami, Katsuyuki Okeya, Hidehiro Katou, Yoshitaka Morikawa |
Skew Frobenius Map and Efficient Scalar Multiplication for Pairing-Based Cryptography. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
|
10 | M. Sudhakar, Ramachandruni Venkata Kamala, M. B. Srinivas |
New and Improved Architectures for Montgomery Modular Multiplication. |
Mob. Networks Appl. |
2007 |
DBLP DOI BibTeX RDF |
reconfigurable multiplier, scalable multiplier, RSA, ECC, carry save adders, Montgomery modular multiplication |
10 | Hamid Sarbazi-Azad |
The performance of synchronous parallel polynomial root extraction on a ring multicomputer. |
Clust. Comput. |
2007 |
DBLP DOI BibTeX RDF |
Polynomial root extraction, Ring architecture, Durand-Kerner method, Parallel algorithms, Iterative techniques |
10 | Zehra Cataltepe, Eser Aygün |
An Improvement of Centroid-Based Classification Algorithm for Text Classification. |
ICDE Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Nan Jiang 0009, David Money Harris |
Parallelized radix-2 scalable Montgomery multiplier. |
VLSI-SoC |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Marcello M. Bonsangue, Alexander Kurz 0001 |
Pi-Calculus in Logical Form. |
LICS |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Sergiu Bursuc, Hubert Comon-Lundh, Stéphanie Delaune |
Deducibility Constraints, Equational Theory and Electronic Money. |
Rewriting, Computation and Proof |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Xiangxue Li, Dong Zheng 0001, Kefei Chen |
Efficient Blind Signatures from Linear Feedback Shift Register. |
CDVE |
2007 |
DBLP DOI BibTeX RDF |
Linear Feedback Shift Register, Blind Signature |
10 | Augusto Jun Devegili, Michael Scott, Ricardo Dahab |
Implementing Cryptographic Pairings over Barreto-Naehrig Curves. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Tamer Güdü |
A New Scalable Hardware Architecture for RSA Algorithm. |
FPL |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Ping Tak Peter Tang |
Modular Multiplication using Redundant Digit Division. |
IEEE Symposium on Computer Arithmetic |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Chong Hee Kim, Jean-Jacques Quisquater |
Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Sung-Kyoung Kim, Dong-Guk Han, Howon Kim 0001, Kyoil Chung, Jongin Lim 0001 |
SPA Countermeasure Based on Unsigned Left-to-Right Recodings. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Eun-Jun Yoon, Kee-Young Yoo |
A Secret-Key Exponential Key Agreement Protocol with Smart Cards. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Robert Granger, Florian Hess, Roger Oyono, Nicolas Thériault, Frederik Vercauteren |
Ate Pairing on Hyperelliptic Curves. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
finite fields, Tate pairing, hyperelliptic curves, Ate pairing |
10 | Colin D. Walter |
Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
RSA, DPA, power analysis, SPA, Side channel leakage |
10 | Andrew Moss, Dan Page, Nigel P. Smart |
Toward Acceleration of RSA Using 3D Graphics Hardware. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Emmanuel Bresson, Yassine Lakhnech, Laurent Mazaré, Bogdan Warinschi |
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
Protocol Security, Provable Scurity, Computational Soundness, Diffie-Hellman Assumptions |
10 | Wael Adi, Rolf Ernst, Bassel Soudan, Abdulrahman Hanoun |
VLSI Design Exchange with Intellectual Property Protection in FPGA Environment Using both Secret and Public-Key Cryptography. |
ISVLSI |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Xue-mi Zhao, Zhiying Wang 0003, Hongyi Lu, Kui Dai |
A 6.35Mbps 1024-bit RSA crypto coprocessor in a 0.18um CMOS technology. |
VLSI-SoC |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Chingwei Yeh, En-Feng Hsu, Kai-Wen Cheng, Jinn-Shyan Wang, Nai-Jen Chang |
An 830mW, 586kbps 1024-bit RSA chip design. |
DATE Designers' Forum |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Robert Granger, Dan Page, Nigel P. Smart |
High Security Pairing-Based Cryptography Revisited. |
ANTS |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Darshan D. Thaker, Tzvetan S. Metodi, Frederic T. Chong |
A Realizable Distributed Ion-Trap Quantum Computer. |
HiPC |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Roberto Zunino, Pierpaolo Degano |
Handling exp, × (and Timestamps) in Protocol Analysis. |
FoSSaCS |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Frédéric Muller, Frédéric Valette |
High-Order Attacks Against the Exponent Splitting Protection. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Isamu Teranishi, Kazue Sako |
k-Times Anonymous Authentication with a Constant Proving Cost. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
k-times anonymous authentication, efficiency, public verifiability |
10 | Abusaleh M. Jabir, Dhiraj K. Pradhan, Jimson Mathew |
An efficient technique for synthesis and optimization of polynomials in GF(2m). |
ICCAD |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Hyun-Sung Kim 0001, Sung-Woon Lee |
Low Complexity Systolic Architecture for Modular Multiplication over GF(2m). |
International Conference on Computational Science (1) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Seungwon Lee, Yookun Cho |
Efficient Batch Verification for RSA-Type Digital Signatures in a Ubiquitous Environment. |
EUC |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Mathieu Turuani |
The CL-Atse Protocol Analyser. |
RTA |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Ambrose Chu, Mihai Sima |
Reconfigurable RSA Cryptography for Embedded Devices. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Lih-Chung Wang, Bo-Yin Yang, Yuh-Hua Hu, Feipei Lai |
A "Medium-Field" Multivariate Public-Key Encryption Scheme. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Alexandros Agapitos, Simon M. Lucas |
Learning Recursive Functions with Object Oriented Genetic Programming. |
EuroGP |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Jin-Hua Hong, Bin-Yan Tsai |
A Fast Bit-Interleaving RSA Cryptosystem Based on Radix-4 Cellular-Array Modular Multiplier. |
APCCAS |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Rosario Gennaro |
An Improved Pseudo-Random Generator Based on the Discrete Logarithm Problem. |
J. Cryptol. |
2005 |
DBLP DOI BibTeX RDF |
Discrete logarithm, Pseudorandomness |
10 | Joachim von zur Gathen, Michael Nöcker |
Polynomial and Normal Bases for Finite Fields. |
J. Cryptol. |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Panagiotis Manolios, Daron Vroon 0001 |
Ordinal Arithmetic: Algorithms and Mechanization. |
J. Autom. Reason. |
2005 |
DBLP DOI BibTeX RDF |
automated reasoning, arithmetic, ACL2, ordinal |
10 | Prateek Gupta, Vitaly Shmatikov |
Towards computationally sound symbolic analysis of key exchange protocols. |
FMSE |
2005 |
DBLP DOI BibTeX RDF |
protocol logic, cryptographic protocols, symbolic analysis, computational soundness |
10 | Alessandro Cilardo, Antonino Mazzeo, Nicola Mazzocca, Luigi Romano |
A Novel Unified Architecture for Public-Key Cryptography. |
DATE |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Yannick Chevalier, Michaël Rusinowitch |
Combining Intruder Theories. |
ICALP |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Deepak Kapur, Paliath Narendran, Lida Wang |
A Unification Algorithm for Analysis of Protocols with Blinded Signatures. |
Mechanizing Mathematical Reasoning |
2005 |
DBLP DOI BibTeX RDF |
|
10 | John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee |
A Traitor Tracing Scheme Based on RSA for Fast Decryption. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
10 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
10 | David Money Harris, Ram Krishnamurthy 0001, Mark A. Anders 0001, Sanu Mathew, Steven Hsu |
An Improved Unified Scalable Radix-2 Montgomery Multiplier. |
IEEE Symposium on Computer Arithmetic |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Dhananjay S. Phatak, Tom Goff |
Fast Modular Reduction for Large Wordlengths via One Linear and One Cyclic Convolution. |
IEEE Symposium on Computer Arithmetic |
2005 |
DBLP DOI BibTeX RDF |
fast modular reduction, large wordlength, FFT multiply, linear convolution, principle of separation, cryptography, elliptic-curve, number theoretic transforms, cyclic convolution |
10 | Hamid Sarbazi-Azad |
Parallel Polynomial Root Extraction on A Ring of Processors. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Michael Haselman, Michael J. Beauchamp, Aaron Wood, Scott Hauck, Keith D. Underwood, K. Scott Hemmert |
A Comparison of Floating Point and Logarithmic Number Systems for FPGAs. |
FCCM |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Lih-Chung Wang, Yuh-Hua Hu, Feipei Lai, Chun-yen Chou, Bo-Yin Yang |
Tractable Rational Map Signature. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
tractable rational maps, digital signature, finite field, public key, multivariate |
10 | Christophe Doche |
Redundant Trinomials for Finite Fields of Characteristic 2. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Katsuyuki Takashima |
Practical Modifications of Leadbitter et al.'s Repeated-Bits Side-Channel Analysis on (EC)DSA. |
WISA |
2005 |
DBLP DOI BibTeX RDF |
(EC)DSA, Side-channel analysis (attack), Lattice basis reduction algorithm, Window method |
10 | David Molnar, Matt Piotrowski, David Schultz, David A. Wagner 0001 |
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Qiang Liu, Dong Tong 0001, Xu Cheng 0001 |
Non-interleaving architecture for hardware implementation of modular multiplication. |
ISCAS (1) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Apostolos P. Fournaris, Odysseas G. Koufopavlou |
A new RSA encryption architecture and hardware implementation based on optimized Montgomery multiplication. |
ISCAS (5) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Jong-wan Seo, Myong-Chul Shin |
A study on an ASIC design technique for digital protective relays. |
ISCAS (4) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Hubert Comon-Lundh, Stéphanie Delaune |
The Finite Variant Property: How to Get Rid of Some Algebraic Properties. |
RTA |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang 0001 |
An Improved Low Computation Cost User Authentication Scheme for Mobile Communication. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Chih-Chung Lu, Shau-Yin Tseng, Szu-Kai Huang |
A Secure Modular Exponential Algorithm Resists to Power, Timing, C Safe Error and M Safe Error Attacks. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Kyle Kelley, David Money Harris |
Very High Radix Scalable Montgomery Multipliers. |
IWSOC |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Siguna Müller |
On the Computation of Square Roots in Finite Fields. |
Des. Codes Cryptogr. |
2004 |
DBLP DOI BibTeX RDF |
complexity, finite fields, square roots, efficient computation |
10 | Benoît Chevallier-Mames, Mathieu Ciet, Marc Joye |
Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity. |
IEEE Trans. Computers |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Johan Håstad, Mats Näslund |
The security of all RSA and discrete log bits. |
J. ACM |
2004 |
DBLP DOI BibTeX RDF |
RSA-encryption, bit-security, complexity, Cryptography, discrete logarithms |
10 | Bi-Hui Chen |
Improvement of authenaticated multiple-key agreement protocol. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
multiple-key, authenticated, key agreement |
10 | Roberto Di Cosmo, Thomas Dufour |
The Equational Theory of < N, 0, 1, +, ×, uparrow > Is Decidable, but Not Finitely Axiomatisable. |
LPAR |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Dan Page, Martijn Stam |
On XTR and Side-Channel Analysis. |
Selected Areas in Cryptography |
2004 |
DBLP DOI BibTeX RDF |
LUC, finite field, side channel attack, power analysis, XTR |
10 | Michael Gordon Abbott, Thorsten Altenkirch, Neil Ghani |
Representing Nested Inductive Types Using W-Types. |
ICALP |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Ross J. Anderson |
The Dancing Bear: A New Way of Composing Ciphers. |
Security Protocols Workshop |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Permandla Pratibha, Siva Nageswara Rao Borra, Annamalai Muthukaruppan, Sivaprakasam Suresh, V. Kamakoti 0001 |
An Evolutionary Algorithm for Automatic Spatial Partitioning in Reconfigurable Environments. |
MICAI |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Song Han 0004, Jie Wang 0038, Wanquan Liu |
An Efficient Identity-Based Group Signature Scheme over Elliptic Curves. |
ECUMN |
2004 |
DBLP DOI BibTeX RDF |
Network Security, Anonymity, Security Protocol, Group Signatures, Weil Pairings |
10 | BaiJie Kuang, Yuefei Zhu, YaJuan Zhang |
An Improved Algorithm for uP + vQ Using JSF13. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Nadia Nedjah, Luiza de Macedo Mourelle |
Towards Very Fast Modular Exponentiations Using Ant Colony. |
WSC |
2004 |
DBLP DOI BibTeX RDF |
|
10 | M. R. K. Krishna Rao |
Learnability of Simply-Moded Logic Programs from Entailment. |
ASIAN |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Rokia Missaoui, Madenda Sarifuddin, Jean Vaillancourt |
An Effective Approach Towards Content-Based Image Retrieval. |
CIVR |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Shaoquan Jiang, Guang Gong |
Multi-service Oriented Broadcast Encryption. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Hee-Kwan Son, Sang-Geun Oh |
Design and Implementation of Scalable Low-Power Montgomery Multiplier. |
ICCD |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Alex Fit-Florea, David W. Matula |
A Digit-Serial Algorithm for the Discrete Logarithm Modulo 2k. |
ASAP |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Manfred Schimmler, Viktor Bunimov |
Fast Modular Multiplication by Operand Changing. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Nadia Nedjah, Luiza de Macedo Mourelle |
Multi-Objective Evolutionary Hardware for RSA-Based Cryptosystems. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Luiza de Macedo Mourelle, Nadia Nedjah |
Efficient Cryptographic Hardware Using the Co-Design Methodology. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Andrés Cordón-Franco, Alejandro Fernández-Margarit, Francisco Félix Lara Martín |
Provably Total Primitive Recursive Functions: Theories with Induction. |
CSL |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi |
Signed Binary Representations Revisited. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Pierre-Alain Fouque, Frédéric Muller, Guillaume Poupard, Frédéric Valette |
Defeating Countermeasures Based on Randomized BSD Representations. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, Sheueling Chang Shantz |
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Colin D. Walter |
Simple Power Analysis of Unified Code for ECC Double and Add. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
unified code, elliptic curve cryptography, ECC, simple power analysis, SPA, Side channel leakage, Montgomery modular multiplication |
10 | Mathieu Ciet, Christophe Giraud 0001 |
Transient Fault Induction Attacks on XTR. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
public-key system XTR, smart cards, countermeasures, Differential fault analysis |
10 | Colin D. Walter |
Longer Keys May Facilitate Side Channel Attacks. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Key Length, Side Channel Attacks, DPA, Power Analysis, Timing Attack, RSA Cryptosystem |
10 | Adi Akavia, Shafi Goldwasser, Shmuel Safra |
Proving Hard-Core Predicates Using List Decoding. |
FOCS |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Gene Tsudik, Shouhuai Xu |
Accumulating Composites and Improved Group Signing. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Shardul Gokhale, Partha Dasgupta |
Distributed Authentication for Peer-to-Peer Networks. |
SAINT Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Panagiotis Manolios, Daron Vroon 0001 |
Algorithms for Ordinal Arithmetic. |
CADE |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Takeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto |
A Fast Signature Scheme Based on New On-line Computation. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Nicoletta Del Buono, Luciano Lopez |
A Survey on Methods for Computing Matrix Exponentials in Numerical Schemes for ODEs. |
International Conference on Computational Science |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Shahrokh Saeednia, Steve Kremer, Olivier Markowitch |
An Efficient Strong Designated Verifier Signature Scheme. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
Designated verifier, Signature, Discrete logarithm, Signcryption |
10 | Zewen Chen, Jilin Wang, Yumin Wang, Jiwu Huang, Daren Huang |
An Efficient Revocation Algorithm in Group Signatures. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Nam-Yeun Kim, Kee-Young Yoo |
Montgomery Multiplication and Squaring Algorithms in GF(2k). |
ICCSA (1) |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Yuji Watanabe, Masayuki Numao |
Multi-round Secure-Light Broadcast Exclusion Protocol with Pre-processing. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Karl Rubin, Alice Silverberg |
Torus-Based Cryptography. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard |
Attacking Unbalanced RSA-CRT Using SPA. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|