Sciweavers

CHES
2001
Springer
130views Cryptology» more  CHES 2001»
14 years 4 months ago
Generating Elliptic Curves of Prime Order
A variation of the Complex Multiplication (CM) method for generating elliptic curves of known order over finite fields is proposed. We give heuristics and timing statistics in th...
Erkay Savas, Thomas A. Schmidt, Çetin Kaya ...
CHES
2001
Springer
59views Cryptology» more  CHES 2001»
14 years 4 months ago
Transparent Harddisk Encryption
This paper introduces a new block cipher, and discusses its security. Its design is optimized for high-bandwidth applications that do not have high requirements on key-schedule lat...
Thomas Pornin
CHES
2001
Springer
191views Cryptology» more  CHES 2001»
14 years 4 months ago
A Scalable GF(p) Elliptic Curve Processor Architecture for Programmable Hardware
Abstract. This work proposes a new elliptic curve processor architecture for the computation of point multiplication for curves defined over fields GF(p). This is a scalable arch...
Gerardo Orlando, Christof Paar
CHES
2001
Springer
77views Cryptology» more  CHES 2001»
14 years 4 months ago
Hessian Elliptic Curves and Side-Channel Attacks
Marc Joye, Jean-Jacques Quisquater
CHES
2001
Springer
71views Cryptology» more  CHES 2001»
14 years 4 months ago
Universal Exponentiation Algorithm
Christophe Clavier, Marc Joye
CHES
2001
Springer
110views Cryptology» more  CHES 2001»
14 years 4 months ago
Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware
Eric Brier, Helena Handschuh, Christophe Tymen
CHES
2001
Springer
98views Cryptology» more  CHES 2001»
14 years 4 months ago
Attacks on Cryptoprocessor Transaction Sets
Attacks are presented on the IBM 4758 CCA and the Visa Security Module. Two new attack principles are demonstrated. Related key attacks use known or chosen differences between two...
Mike Bond
CHES
2001
Springer
86views Cryptology» more  CHES 2001»
14 years 4 months ago
Electromagnetic Analysis: Concrete Results
Karine Gandolfi, Christophe Mourtel, Francis Olivi...
CHES
2001
Springer
193views Cryptology» more  CHES 2001»
14 years 4 months ago
Preventing SPA/DPA in ECC Systems Using the Jacobi Form
Abstract. In this paper we show how using a representation of an elliptic curve as the intersection of two quadrics in P3 can provide a defence against Simple and Differental Powe...
Pierre-Yvan Liardet, Nigel P. Smart
CALC
2001
Springer
161views Cryptology» more  CALC 2001»
14 years 4 months ago
The Shortest Vector Problem in Lattices with Many Cycles
In this paper we investigate how the complexity of the shortest vector problem in a lattice Λ depends on the cycle structure of the additive group Zn /Λ. We give a proof that the...
Mårten Trolin