Sciweavers

CRYPTO
1999
Springer
159views Cryptology» more  CRYPTO 1999»
14 years 27 days ago
UMAC: Fast and Secure Message Authentication
We describe a message authentication algorithm, UMAC, which can authenticate messages (in software, on contemporary machines) roughly an order of magnitude faster than current prac...
John Black, Shai Halevi, Hugo Krawczyk, Ted Krovet...
CHES
1999
Springer
104views Cryptology» more  CHES 1999»
14 years 27 days ago
A Scalable Architecture for Montgomery Multiplication
Abstract. This paper describes the methodology and design of a scalable Montgomery multiplication module. There is no limitation on the maximum number of bits manipulated by the mu...
Alexandre F. Tenca, Çetin Kaya Koç
CHES
1999
Springer
91views Cryptology» more  CHES 1999»
14 years 27 days ago
A High-Performance Flexible Architecture for Cryptography
Cryptographic algorithms are more efficiently implemented in custom hardware than in software running on general-purpose processors. However, systems which use hardware implementat...
R. Reed Taylor, Seth Copen Goldstein
CHES
1999
Springer
140views Cryptology» more  CHES 1999»
14 years 27 days ago
Power Analysis Attacks of Modular Exponentiation in Smartcards
Abstract. Three new types of power analysis attacks against smartcard implementations of modular exponentiation algorithms are described. The first attack requires an adversary to ...
Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sl...
CHES
1999
Springer
75views Cryptology» more  CHES 1999»
14 years 27 days ago
Efficient Finite Field Basis Conversion Involving Dual Bases
Burton S. Kaliski Jr., Moses Liskov
CHES
1999
Springer
99views Cryptology» more  CHES 1999»
14 years 27 days ago
Probing Attacks on Tamper-Resistant Devices
Abstract. This paper describes a new type of attack on tamper-resistant cryptographic hardware. We show that by locally observing the value of a few RAM or adress bus bits (possibl...
Helena Handschuh, Pascal Paillier, Jacques Stern
CHES
1999
Springer
133views Cryptology» more  CHES 1999»
14 years 27 days ago
Random Number Generators Founded on Signal and Information Theory
The strength of a cryptographic function depends on the amount of entropy in the cryptovariables that are used as keys. Using a large key length with a strong algorithm is false co...
David Paul Maher, Robert J. Rance
ASIACRYPT
1999
Springer
14 years 27 days ago
Linear Complexity versus Pseudorandomness: On Beth and Dai's Result
Abstract. Beth and Dai studied in their Eurocrypt paper [1] the relationship between linear complexity (that is, the length of the shortest Linear Feedback Shift Register that gene...
Yongge Wang
ASIACRYPT
1999
Springer
14 years 27 days ago
On the Design of RSA with Short Secret Exponent
Hung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih