Sciweavers

517 search results - page 14 / 104
» Bit Encryption Is Complete
Sort
View
INFORMATICALT
2002
69views more  INFORMATICALT 2002»
13 years 7 months ago
Improving the Information Rate of a Private-key Cryptosystem Based on Product Codes
Recently, Sun proposed a private-key encryption scheme based on the product codes with the capability of correcting a special type of structured errors. In this paper, we present a...
Hung-Min Sun
FSE
2004
Springer
123views Cryptology» more  FSE 2004»
13 years 11 months ago
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware
Abstract. We present a fast involutional block cipher optimized for reconfigurable hardware implementations. ICEBERG uses 64-bit text blocks and 128-bit keys. All components are in...
François-Xavier Standaert, Gilles Piret, Ga...
CHES
1999
Springer
99views Cryptology» more  CHES 1999»
14 years 11 days ago
Probing Attacks on Tamper-Resistant Devices
Abstract. This paper describes a new type of attack on tamper-resistant cryptographic hardware. We show that by locally observing the value of a few RAM or adress bus bits (possibl...
Helena Handschuh, Pascal Paillier, Jacques Stern
ISCAS
2008
IEEE
154views Hardware» more  ISCAS 2008»
14 years 2 months ago
A 6.3nJ/op low energy 160-bit modulo-multiplier for elliptic curve cryptography processor
— A low energy modulo-multiplier is proposed for elliptic curve cryptography (ECC) processor, especially for authentication in mobile device or key encryption in embedded health-...
Hyejung Kim, Yongsang Kim, Hoi-Jun Yoo
ISCAS
2005
IEEE
153views Hardware» more  ISCAS 2005»
14 years 1 months ago
A RAM-based FPGA implementation of the 64-bit MISTY1 block cipher
—A high-throughput hardware architecture and FPGA implementation of the 64-bit NESSIE proposal, MISTY1 block cipher, is presented in this paper. This architecture, in contrast to...
Paris Kitsos, Michalis D. Galanis, Odysseas G. Kou...