Sciweavers

281 search results - page 2 / 57
» Non-black-box Techniques in Cryptography
Sort
View
CARDIS
1998
Springer
111views Hardware» more  CARDIS 1998»
14 years 3 months ago
Smart Card Crypto-Coprocessors for Public-Key Cryptography
This paper intends to provide information about up-to-date performances of smart-card arithmetic coprocessors regarding major public-key cryptosystems and analyze the main tendence...
Helena Handschuh, Pascal Paillier
ARITH
1993
IEEE
14 years 3 months ago
Fast implementations of RSA cryptography
We detail and analyse the critical techniques which may be combined in the design of fast hardware for RSA cryptography: chinese remainders, star chains, Hensel's odd divisio...
Mark Shand, Jean Vuillemin
CHES
2008
Springer
132views Cryptology» more  CHES 2008»
14 years 1 months ago
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography
Bit-slicing is a non-conventional implementation technique for cryptographic software where an n-bit processor is considered as a collection of n 1-bit execution units operating in...
Philipp Grabher, Johann Großschädl, Dan...
ADT
2006
13 years 11 months ago
Data Confidentiality: to which extent cryptography and secured hardware can help
Data confidentiality has become a major concern for individuals as well as for companies and administrations. In a classical client-server setting, the access control management is...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
JSA
2007
139views more  JSA 2007»
13 years 11 months ago
High-speed hardware implementations of Elliptic Curve Cryptography: A survey
For the last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the industry and the academic community and has been the subject of several standards. T...
Guerric Meurice de Dormale, Jean-Jacques Quisquate...