Sciweavers

124
Voted
CHES
2006
Springer
125views Cryptology» more  CHES 2006»
15 years 7 months ago
Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware
A novel portable hardware architecture of the Elliptic Curve Method of factoring, designed and optimized for application in the relation collection step of the Number Field Sieve,...
Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbr...
143
Voted
CHES
2006
Springer
105views Cryptology» more  CHES 2006»
15 years 7 months ago
Power Attack on Small RSA Public Exponent
In this paper, we present a new attack on RSA when the public exponent is short, for instance 3 or 216 +1, and when the classical exponent randomization is used. This attack works ...
Pierre-Alain Fouque, Sébastien Kunz-Jacques...
CHES
2006
Springer
82views Cryptology» more  CHES 2006»
15 years 7 months ago
FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers
We describe algorithms for point multiplication on Koblitz curves using multiple-base expansions of the form k =
V. S. Dimitrov, Kimmo U. Järvinen, M. J. Jaco...
131
Voted
CHES
2006
Springer
88views Cryptology» more  CHES 2006»
15 years 7 months ago
Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage
Recent research has shown that cryptographers with glitches are vulnerable in front of Side Channel Attacks (SCA). Since then, several methods, such as Wave Dynamic Differential Lo...
Zhimin Chen, Yujie Zhou
CHES
2006
Springer
123views Cryptology» more  CHES 2006»
15 years 7 months ago
Improving SHA-2 Hardware Implementations
Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, Sta...