Sciweavers

388 search results - page 58 / 78
» Bipartite Modular Multiplication
Sort
View
3DPVT
2006
IEEE
242views Visualization» more  3DPVT 2006»
14 years 25 days ago
Towards On-Line Digital Doubles
We present a modular system for real-time 3D-scanning of human bodies under motion. The high-resolution shape and colour appearance is captured by several scanning units positione...
Andreas Griesser, Nico Cornelis, Luc J. Van Gool
ITCC
2005
IEEE
14 years 10 days ago
A Scalable Dual Mode Arithmetic Unit for Public Key Cryptosystems
Elliptic Curve Cryptosystems (ECC) have become popular in recent years due to their smaller key sizes than traditional public key schemes such as RSA. However the gap between the ...
Francis M. Crowe, Alan Daly, William P. Marnane
DRMTICS
2005
Springer
14 years 8 days ago
A Vector Approach to Cryptography Implementation
The current deployment of Digital Right Management (DRM) schemes to distribute protected contents and rights is leading the way to massive use of sophisticated embedded cryptograph...
Jacques J. A. Fournier, Simon W. Moore
CHES
2004
Springer
99views Cryptology» more  CHES 2004»
14 years 4 days ago
Defeating Countermeasures Based on Randomized BSD Representations
Abstract. The recent development of side channel attacks has lead implementers to use increasingly sophisticated countermeasures in critical operations such as modular exponentiati...
Pierre-Alain Fouque, Frédéric Muller...
CHES
2004
Springer
187views Cryptology» more  CHES 2004»
14 years 4 days ago
A New Attack with Side Channel Leakage During Exponent Recoding Computations
In this paper we propose a new side channel attack, where exponent recodings for public key cryptosystems such as RSA and ECDSA are considered. The known side channel attacks and c...
Yasuyuki Sakai, Kouichi Sakurai