Montgomery modular multiplication

Results: 17



#Item
1Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
2Remote Timing Attacks are Practical David Brumley Stanford University  Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
3Trinomial bases and Chinese remaindering for modular polynomial multiplication ´ Eric Schost1 and Arash Hariri2 1

Trinomial bases and Chinese remaindering for modular polynomial multiplication ´ Eric Schost1 and Arash Hariri2 1

Add to Reading List

Source URL: www.csd.uwo.ca

Language: English - Date: 2008-12-16 23:33:36
4Fast Arithmetic for Triangular Sets: from Theory to Practice Xin Li ORCCA, University of Western Ontario (UWO)

Fast Arithmetic for Triangular Sets: from Theory to Practice Xin Li ORCCA, University of Western Ontario (UWO)

Add to Reading List

Source URL: www.csd.uwo.ca

Language: English - Date: 2007-05-25 08:40:22
5doicomjnl/bxr119

doicomjnl/bxr119

Add to Reading List

Source URL: www.inesc-id.pt

Language: English - Date: 2011-12-03 09:51:22
6Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2015-09-06 14:08:28
7Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations Onur Acıic¸mez Werner Schindler

Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations Onur Acıic¸mez Werner Schindler

Add to Reading List

Source URL: tls.mbed.org

Language: English - Date: 2016-01-19 07:39:30
8Remote Timing Attacks are Practical David Brumley Stanford University  Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: tls.mbed.org

Language: English
9A Timing Attack against RSA with the Chinese Remainder Theorem Werner Schindler Bundesamt f¨ ur Sicherheit in der Informationstechnik (BSI) Godesberger Allee 183, 53175 Bonn, Germany

A Timing Attack against RSA with the Chinese Remainder Theorem Werner Schindler Bundesamt f¨ ur Sicherheit in der Informationstechnik (BSI) Godesberger Allee 183, 53175 Bonn, Germany

Add to Reading List

Source URL: tls.mbed.org

Language: English
10Journal of Cryptographic Engineering manuscript No. (will be inserted by the editor) A Preliminary FPGA Implementation and Analysis of Phatak’s Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number S

Journal of Cryptographic Engineering manuscript No. (will be inserted by the editor) A Preliminary FPGA Implementation and Analysis of Phatak’s Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number S

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-18 10:27:44