Sciweavers

169 search results - page 14 / 34
» Experimental Quantum Cryptography
Sort
View
CHES
2003
Springer
104views Cryptology» more  CHES 2003»
14 years 2 months ago
Power-Analysis Attacks on an FPGA - First Experimental Results
Field Programmable Gate Arrays (FPGAs) are becoming increasingly popular, especially for rapid prototyping. For implementations of cryptographic algorithms, not only the speed and ...
Siddika Berna Örs, Elisabeth Oswald, Bart Pre...
SBCCI
2006
ACM
124views VLSI» more  SBCCI 2006»
14 years 3 months ago
A cryptography core tolerant to DFA fault attacks
This work describes a hardware approach for the concurrent fault detection and error correction in a cryptographic core. It has been shown in the literature that transient faults ...
Carlos Roberto Moratelli, Érika F. Cota, Ma...
CMA
2010
183views more  CMA 2010»
13 years 5 months ago
Ramanujan's class invariants and their use in elliptic curve cryptography
Complex Multiplication (CM) method is a frequently used method for the generation of elliptic curves (ECs) over a prime field Fp. The most demanding and complex step of this metho...
Elisavet Konstantinou, Aristides Kontogeorgis
ISMVL
2003
IEEE
68views Hardware» more  ISMVL 2003»
14 years 2 months ago
Multi-Output Galois Field Sum of Products Synthesis with New Quantum Cascades
Galois Field Sum of Products (GFSOP) leads to efficient multi-valued reversible circuit synthesis using quantum gates. In this paper, we propose a new generalization of ternary To...
Mozammel H. A. Khan, Marek A. Perkowski, Pawel Ker...
SODA
2010
ACM
200views Algorithms» more  SODA 2010»
14 years 6 months ago
Algorithms for ray class groups and Hilbert class fields
This paper analyzes the complexity of problems from class field theory. Class field theory can be used to show the existence of infinite families of number fields with constant ro...
Sean Hallgren, Kirsten Eisentraeger