Sciweavers

IMA
2007
Springer
129views Cryptology» more  IMA 2007»
13 years 10 months ago
Toward Acceleration of RSA Using 3D Graphics Hardware
Demand in the consumer market for graphics hardware that accelerates rendering of 3D images has resulted in commodity devices capable of astonishing levels of performance. These re...
Andrew Moss, Dan Page, Nigel P. Smart
IMA
2007
Springer
94views Cryptology» more  IMA 2007»
13 years 10 months ago
Optimised Versions of the Ate and Twisted Ate Pairings
The Ate pairing and the twisted Ate pairing for ordinary elliptic curves which are generalizations of the ηT pairing for supersingular curves have previously been proposed. It is ...
Seiichi Matsuda, Naoki Kanayama, Florian Hess, Eij...
IMA
2007
Springer
117views Cryptology» more  IMA 2007»
13 years 10 months ago
On the Connection Between Signcryption and One-Pass Key Establishment
Key establishment between two parties that uses only one message transmission is referred to as one-pass key establishment (OPKE). OPKE provides the opportunity for very efficient ...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
IMA
2007
Springer
97views Cryptology» more  IMA 2007»
13 years 10 months ago
Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes
Non-linear cryptanalysis is a natural extension to Matsui’s linear cryptanalitic techniques in which linear approximations are replaced by nonlinear expressions. Non-linear appro...
Juan M. Estévez-Tapiador, John A. Clark, Ju...
IMA
2007
Springer
137views Cryptology» more  IMA 2007»
13 years 10 months ago
Algebraic Cryptanalysis of the Data Encryption Standard
In spite of growing importance of AES, the Data Encryption Standard is by no means obsolete. DES has never been broken from the practical point of view. The triple DES is believed ...
Nicolas Courtois, Gregory V. Bard
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
13 years 10 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...