Sciweavers

164 search results - page 14 / 33
» Implementation of the GBD Cryptosystem
Sort
View
ITCC
2005
IEEE
14 years 3 months ago
Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations
Recently, a lot of effort has been done to investigate all kinds of explicit formulae for speeding up group operation of hyperelliptic curve cryptosystem (HECC). In this paper, ex...
Xinxin Fan, Thomas J. Wollinger, Yumin Wang
AMC
2006
91views more  AMC 2006»
13 years 10 months ago
Fast elliptic scalar multiplication using new double-base chain and point halving
The fast implementation of elliptic curve cryptosystems relies on the efficient computation of scalar multiplication. Based on the double-base chain representation of scalar using...
Kwok-Wo Wong, Edward C. W. Lee, L. M. Cheng, Xiaof...
CANS
2006
Springer
129views Cryptology» more  CANS 2006»
14 years 1 months ago
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Pairings on elliptic curves have been used as cryptographic primitives for the development of new applications such as identity based schemes. For the practical applications, it is...
Tae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Wo...
ISCAS
1999
IEEE
124views Hardware» more  ISCAS 1999»
14 years 2 months ago
CMOS cryptosystem using a Lorenz chaotic oscillator
This paper presents a monolithic implementation of a cryptosystem based on the Corron and Hahs scheme [I]. The baseband chaotic encryptioddecryption system has been designed at th...
O. A. Gonzalez, Gunhee Han, José Pineda de ...
FC
2010
Springer
180views Cryptology» more  FC 2010»
13 years 11 months ago
Lighten Encryption Schemes for Secure and Private RFID Systems
We provide several concrete implementations of a generic method given by Vaudenay to construct secure privacy-preserving RFID authentication and identification systems. More precis...
Sébastien Canard, Iwen Coisel, Jonathan Etr...