Sciweavers

90 search results - page 5 / 18
» Fast implementations of RSA cryptography
Sort
View
FDTC
2009
Springer
104views Cryptology» more  FDTC 2009»
14 years 1 months ago
Low Voltage Fault Attacks on the RSA Cryptosystem
—Fault injection attacks are a powerful tool to exploit implementative weaknesses of robust cryptographic algorithms. The faults induced during the computation of the cryptograph...
Alessandro Barenghi, Guido Bertoni, Emanuele Parri...
ITCC
2005
IEEE
14 years 17 days ago
A Parallelized Design for an Elliptic Curve Cryptosystem Coprocessor
In many applications a software implementation of ECC (Elliptic Curve Cryptography) might be inappropriate due to performance requirements, therefore hardware implementations are ...
Fabio Sozzani, Guido Bertoni, Stefano Turcato, Luc...
PKC
1999
Springer
87views Cryptology» more  PKC 1999»
13 years 11 months ago
On the Security of RSA Screening
Since many applications require the verification of large sets of signatures, it is sometimes advantageous to perform a simultaneous verification instead of checking each signatu...
Jean-Sébastien Coron, David Naccache
SPAA
1990
ACM
13 years 11 months ago
Hardware Speedups in Long Integer Multiplication
We present various experiments in Hardware/Software designtradeoffs met in speeding up long integer multiplications. This work spans over a year, with more than 12 different hardw...
Mark Shand, Patrice Bertin, Jean Vuillemin
CSREASAM
2008
13 years 8 months ago
Implementing Cryptography for Packet Level Authentication
Abstract--Packet Level Authentication (PLA) is a novel countermeasure against distributed denial-of-service attacks. Each packet sent across a network has a digital signature and p...
Billy Bob Brumley