Sciweavers

209 search results - page 33 / 42
» Supersingular Curves in Cryptography
Sort
View
CORR
2010
Springer
89views Education» more  CORR 2010»
13 years 8 months ago
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
ESORICS
2011
Springer
12 years 7 months ago
Remote Timing Attacks Are Still Practical
For over two decades, timing attacks have been an active area of research within applied cryptography. These attacks exploit cryptosystem or protocol implementations that do not ru...
Billy Bob Brumley, Nicola Tuveri
EUROCRYPT
2009
Springer
14 years 8 months ago
Double-Base Number System for Multi-scalar Multiplications
Abstract. The Joint Sparse Form is currently the standard representation system to perform multi-scalar multiplications of the form [n]P + m[Q]. We introduce the concept of Joint D...
Christophe Doche, David R. Kohel, Francesco Sica
ISCAS
2006
IEEE
102views Hardware» more  ISCAS 2006»
14 years 1 months ago
A fast dual-field modular arithmetic logic unit and its hardware implementation
— We propose a fast Modular Arithmetic Logic Unit (MALU) that is scalable in the digit size (d) and the field size (k). The datapath of MALU has chains of Carry Save Adders (CSA...
Kazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede
AICCSA
2008
IEEE
283views Hardware» more  AICCSA 2008»
14 years 2 months ago
Performance analysis of identity management in the Session Initiation Protocol (SIP)
The Session Initiation Protocol (SIP) is a standard for managing IP multimedia sessions in the Internet. Identity management in SIP is a crucial security field that deals with id...
Yacine Rebahi, Jordi Jaen Pallares, Tuan Minh Nguy...