Sciweavers

PAIRING
2010
Springer
155views Cryptology» more  PAIRING 2010»
13 years 9 months ago
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches
Abstract. This paper describes a new method in pairing-based signature schemes for identifying the invalid digital signatures in a batch after batch verification has failed. The me...
Brian J. Matt
PAIRING
2010
Springer
133views Cryptology» more  PAIRING 2010»
13 years 9 months ago
Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree
Scott uses an efficiently computable isomorphism in order to optimize pairing computation on a particular class of curves with embedding degree 2. He points out that pairing implem...
Sorina Ionica, Antoine Joux
LATINCRYPT
2010
13 years 9 months ago
Combined Implementation Attack Resistant Exponentiation
Different types of implementation attacks, like those based on side channel leakage and active fault injection, are often considered as separate threats. Countermeasures are, there...
Jörn-Marc Schmidt, Michael Tunstall, Roberto ...
LATINCRYPT
2010
13 years 9 months ago
Starfish on Strike
This paper improves the price-performance ratio of ECM, the elliptic-curve method of integer factorization. In particular, this paper constructs "a = -1" twisted Edwards ...
Daniel J. Bernstein, Peter Birkner, Tanja Lange
INDOCRYPT
2010
Springer
13 years 9 months ago
One Byte per Clock: A Novel RC4 Hardware
RC4, the widely used stream cipher, is well known for its simplicity and ease of implementation in software. In case of a special purpose hardware designed for RC4, the best known ...
Sourav Sengupta, Koushik Sinha, Subhamoy Maitra, B...
INDOCRYPT
2010
Springer
13 years 9 months ago
Getting a Few Things Right and Many Things Wrong
: Radio frequency identification (RFID) is a technology for the automated identification of physical entities using radio frequency transmissions. In the past ten years, RFID syste...
Neal Koblitz
INDOCRYPT
2010
Springer
13 years 9 months ago
Speeding Up the Wide-Pipe: Secure and Fast Hashing
In this paper we propose a new sequential mode of operation
Mridul Nandi, Souradyuti Paul
INDOCRYPT
2010
Springer
13 years 9 months ago
Attack on a Higher-Order Masking of the AES Based on Homographic Functions
In the recent years, Higher-order Side Channel attacks have been widely investigated. In particular, 2nd-order DPA have been improved and successfully applied to break several mask...
Emmanuel Prouff, Thomas Roche
INDOCRYPT
2010
Springer
13 years 9 months ago
The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA
Abstract. In this paper we present a new statistical cryptanalytic technique that we call improbable differential cryptanalysis which uses a differential that is less probable when...
Cihangir Tezcan