Sciweavers

1769 search results - page 137 / 354
» Cryptography
Sort
View
129
Voted
CHES
2005
Springer
83views Cryptology» more  CHES 2005»
15 years 9 months ago
Fast Truncated Multiplication for Cryptographic Applications
The Truncated Multiplication computes a truncated product, a contiguous subsequence of the digits of the product of 2 integers. A few truncated polynomial multiplication algorithms...
Laszlo Hars
113
Voted
CHES
2005
Springer
99views Cryptology» more  CHES 2005»
15 years 9 months ago
Short Memory Scalar Multiplication on Koblitz Curves
Abstract. We present a new method for computing the scalar multiplication on Koblitz curves. Our method is as fast as the fastest known technique but requires much less memory. We ...
Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaum...
147
Voted
CHES
2005
Springer
117views Cryptology» more  CHES 2005»
15 years 9 months ago
DPA Leakage Models for CMOS Logic Circuits
In this paper, we propose new models for directly evaluating DPA leakage from logic information in CMOS circuits. These models are based on the transition probability for each gate...
Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa
122
Voted
EUROCRYPT
2005
Springer
15 years 9 months ago
3-Move Undeniable Signature Scheme
In undeniable signature schemes, zero-knowledgeness and non-transferability have been identified so far. In this paper, by separating these two notions, we show the first 3-move ...
Kaoru Kurosawa, Swee-Huay Heng
98
Voted
FSE
2005
Springer
97views Cryptology» more  FSE 2005»
15 years 9 months ago
A New Class of Single Cycle T-Functions
T-function is a relatively new cryptographic building block suitable for streamciphers. It has the potential of becoming a substitute for LFSRs, and those that correspond to maximu...
Jin Hong, Dong Hoon Lee 0002, Yongjin Yeom, Daewan...