Sciweavers

32 search results - page 4 / 7
» Arithmetic Operators for Pairing-Based Cryptography
Sort
View
ASAP
2004
IEEE
160views Hardware» more  ASAP 2004»
15 years 9 months ago
Architectural Support for Arithmetic in Optimal Extension Fields
Public-key cryptosystems generally involve computation-intensive arithmetic operations, making them impractical for software implementation on constrained devices such as smart ca...
Johann Großschädl, Sandeep S. Kumar, Ch...
ARITH
1999
IEEE
15 years 9 months ago
Moduli for Testing Implementations of the RSA Cryptosystem
Comprehensive testing of any implementation of the RSA cryptosystem requires the use of a number of moduli with specific properties. It is shown how to generate a sufficient varie...
Colin D. Walter
CHES
2004
Springer
148views Cryptology» more  CHES 2004»
15 years 10 months ago
Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations
We present an implementation of elliptic curves and of hyperelliptic curves of genus 2 and 3 over prime fields. To achieve a fair comparison between the different types of groups,...
Roberto Maria Avanzi
ISSAC
1992
Springer
114views Mathematics» more  ISSAC 1992»
15 years 9 months ago
Parallel Lattice Basis Reduction
Abstract. Lattice basis reduction is an important problem in geometry of numbers with applications in combinatorial optimization, computer algebra, and cryptography. The well-known...
Gilles Villard
ISJGP
2010
15 years 2 months ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos