搜索结果: 1-7 共查到“军事学 Software Implementations”相关记录7条 . 查询时间(0.109 秒)
Efficient and secure software implementations of Fantomas
LS-Design Fantomas side-channel resistance
font style='font-size:12px;'>
2019/8/8
In this paper, the efficient software implementation and side-channel resistance of the LS-Design construction is studied through a series of software implementations of the Fantomas block cipher, one...
Fully Automated Differential Fault Analysis on Software Implementations of Cryptographic Algorithms
differential fault analysis cryptographic fault attacks automation
font style='font-size:12px;'>
2018/6/5
Emerging technologies with the requirement of small size and portability, such as Internet-of-Things devices, represent a good target for physical attacks, e.g., fault attacks. These attacks often aim...
Efficient Software Implementations of Modular Exponentiation
modular arithmetic modular exponentiation Montgomery multiplication RSA
font style='font-size:12px;'>
2012/3/28
RSA computations have a significant effect on the workloads of SSL/TLS servers, and therefore their software implementations on general purpose processors are an important target for optimization. We ...
Efficient Software Implementations of Modular Exponentiation
modular exponentiation Montgomery multiplication RSA
font style='font-size:12px;'>
2011/6/8
RSA computations have a significant effect on the workloads of SSL/TLS servers, and therefore their software implementations on general purpose processors are an important target for optimization. We ...
Comparison of seven SHA-3 candidates software implementations on smart cards
seven SHA-3 candidates software implementations smart cards
font style='font-size:12px;'>
2010/10/20
In this work, we present and compare seven SHA-3 second-round candidates implementations on two different architectures used on smart cards: the Intel 8051 and the ARM7TDMI. After presenting the perfo...
Higher-order Masking and Shuffling for Software Implementations of Block Ciphers– Extended Version –
Higher-order Masking Software Implementations Block Ciphers
font style='font-size:12px;'>
2009/9/2
Differential Power Analysis (DPA) is a powerful side channel
key recovery attack that efficiently breaks block ciphers implementations.
In software, two main techniques are usually applied to thwart...
ASPECTS OF HYPERELLIPTIC CURVES OVER LARGE PRIME FIELDS IN SOFTWARE IMPLEMENTATIONS
HYPERELLIPTIC CURVES LARGE PRIME FIELDS SOFTWARE IMPLEMENTATIONS
font style='font-size:12px;'>
2009/4/10
This paper presents an implementation of genus 2 and 3 hyperelliptic curves over prime fields,
with a comparison with elliptic curves. To achieve a fair comparison, we developed an ad-hoc
arithmetic...