Sciweavers

472 search results - page 40 / 95
» A Software-Optimized Encryption Algorithm
Sort
View
FPL
2011
Springer
233views Hardware» more  FPL 2011»
12 years 9 months ago
Compact CLEFIA Implementation on FPGAS
In this paper two compact hardware structures for the computation of the CLEFIA encryption algorithm are presented. One structure based on the existing state of the art and a nove...
Paulo Proenca, Ricardo Chaves
MM
2004
ACM
97views Multimedia» more  MM 2004»
14 years 3 months ago
Security of human video objects by incorporating a chaos-based feedback cryptographic scheme
Security of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. However most cryptographic systems deal with multimedia...
Paraskevi K. Tzouveli, Klimis S. Ntalianis, Stefan...
CHES
2007
Springer
105views Cryptology» more  CHES 2007»
14 years 4 months ago
On the Implementation of a Fast Prime Generation Algorithm
Abstract. A side-channel analysis of a cryptographic algorithm generally concentrates on the encryption or decryption phases, rarely on the key generation phase. In this paper, we ...
Christophe Clavier, Jean-Sébastien Coron
CHES
2003
Springer
88views Cryptology» more  CHES 2003»
14 years 3 months ago
A New Algorithm for Switching from Arithmetic to Boolean Masking
To protect a cryptographic algorithm against Differential Power Analysis, a general method consists in masking all intermediate data with a random value. When a cryptographic algo...
Jean-Sébastien Coron, Alexei Tchulkine
PKC
2004
Springer
95views Cryptology» more  PKC 2004»
14 years 3 months ago
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups
Boneh and Venkatesan have proposed a polynomial time algorithm in a non-uniform model for recovering a ”hidden” element α ∈ IFp, where p is prime, from very short strings of...
Igor Shparlinski, Arne Winterhof