Sciweavers

177 search results - page 12 / 36
» Overdetermined Elliptic Systems
Sort
View
DATE
2009
IEEE
91views Hardware» more  DATE 2009»
13 years 11 months ago
Optimizing the HW/SW boundary of an ECC SoC design using control hierarchy and distributed storage
Abstract--Hardware/Software codesign of Elliptic Curve Cryptography has been extensively studied in recent years. However, most of these designs have focused on the computational a...
Xu Guo, Patrick Schaumont
AMC
2007
87views more  AMC 2007»
13 years 7 months ago
Generalized Clenshaw-Curtis quadrature rule with application to a collocation least-squares method
This paper deals with an extension of one-dimensional Clenshaw–Curtis quadrature rule to Rd ; d P 2 on a convex domain. As one of its applications, we apply this quadrature rule...
Changho Kim, Sang Dong Kim, Jungho Yoon
IJNSEC
2006
89views more  IJNSEC 2006»
13 years 7 months ago
Expansion of Sliding Window Method for Finding Shorter Addition/Subtraction-Chains
Finding a shorter addition/subtraction-chain for an integer is an important problem for many cryptographic systems based on number theory. Especially, execution time of multiplica...
Younho Lee, Heeyoul Kim, Seong-Min Hong, Hyunsoo Y...
MYCRYPT
2005
Springer
189views Cryptology» more  MYCRYPT 2005»
14 years 1 months ago
An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm
In this paper we produce a practical and efficient algorithm to find a decomposition of type n = kˆ i=1 2si 3ti , si, ti ∈ N ∪ {0} with k ≤   c + o(1) ¡ log n log log n ....
Mathieu Ciet, Francesco Sica
CHES
2001
Springer
193views Cryptology» more  CHES 2001»
14 years 1 days ago
Preventing SPA/DPA in ECC Systems Using the Jacobi Form
Abstract. In this paper we show how using a representation of an elliptic curve as the intersection of two quadrics in P3 can provide a defence against Simple and Differental Powe...
Pierre-Yvan Liardet, Nigel P. Smart