搜索结果: 1-15 共查到“军事学 Efficient implementation”相关记录17条 . 查询时间(0.16 秒)
Masking Dilithium: Efficient Implementation and Side-Channel Evaluation
Efficient Implementation Side-Channel Evaluation
2019/4/22
Although security against side-channel attacks is not an explicit design criterion of the NIST post-quantum standardization effort, it is certainly a major concern for schemes that are meant for real-...
Efficient Implementation of Password-Based Authenticated Key Exchange from RLWE and Post-Quantum TLS
Authenticated Key Exchange Implementation Post-quantum
2017/12/19
Two post-quantum password-based authenticated key exchange (PAKE) protocols were proposed at CT-RSA 2017. Following this work, we give much more efficient and portable C++ implementation of these two ...
Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol
RLWE Post Quantum Key Exchange
2017/12/11
Error reconciliation is an important technique for Learning With Error (LWE) and Ring-LWE (RLWE)-based constructions. In this paper, we present a comparison analysis on two error reconciliation-based ...
Very High Order Masking: Efficient Implementation and Security Evaluation
masking block ciphers, performances security evaluations
2017/7/4
In this paper, we study the performances and security of recent masking algorithms specialized to parallel implementations in a 32-bit embedded software platform, for the standard AES Rijndael and the...
Fast Modular Arithmetic on the Kalray MPPA-256 Processor for an Energy-Efficient Implementation of ECM
Kalray MPPA-256 manycore processor Multiprecision modular arithmetic Integer factorization
2016/4/13
The Kalray MPPA-256 processor is based on a recent low-energy manycore architecture. In this article, we investigate its performance in multiprecision arithmetic for number-theoretic applications. We ...
Efficient Implementation of Keyless Signatures with Hash Sequence Authentication
digital signatures hash functions
2016/1/7
We present new ideas for decreasing the size of secure memory needed for hardware implementations
of hash-sequence based signatures proposed recently by Buldas, Laanoja and Truu (in the
following re...
Bitwise Linear Mappings with Good Cryptographic Properties and Efficient Implementation
symmetric ciphers cryptographic properties
2016/1/3
Linear mappings are crucial components of symmetric ciphers. A
special type of linear mappings are (0,1)-matrices which have been used in
symmetric ciphers such as ARIA, E2 and Camellia as diffusion...
Efficient implementation of AND, OR and NOT operators for ABCs
Attribute-based credentials Smart Cards
2015/12/21
In the last few years several practitioners have proposed different
strategies for implementing Attribute-based credentials (ABCs) on
smart cards. ABCs allow citizens to prove certain properties abo...
The advent of Pairing-based protocols has had a major impact on the applicability of cryptography to the solution of more complex real-world problems. However there has always been a question mark ove...
Efficient Implementation of the $\eta_T$ Pairing on GPU
implementation / public-key cryptography
2012/3/23
Recently, efficient implementation of cryptographic algorithms on graphics processing units (GPUs) has attracted a lot of attention in the cryptologic research community. In this paper, we deal with e...
Efficient Implementation of Grand Cru with TI C6x+ Processor
Grand Cru Keyed Structure of AES-128 DSP Implementation of Grand Cru
2011/7/25
Grand Cru, a candidate cipher algorithm of NESSIE project, is based on the strategy of multiple layered security and derived from AES-128.
The advent of Pairing-based protocols has had a major impact on the applicability of cryptography to the solution of more complex real-world problems. However there has always been a question mark ove...
Efficient Implementation of Grand Cru with TI C6x+ Processor
implementation / Grand Cru Keyed Structure of AES-128 DSP Implementation of
2012/3/27
Grand Cru, a candidate cipher algorithm of NESSIE project, is based on the strategy of multiple layered security and derived from AES-128. This algorithm was not selected for second phase evaluation o...
Efficient Implementation of Genus Three Hyperelliptic Curve Cryptography over F2n
hyperelliptic curve arithmetic scalar multiplication Harley algorithm
2009/4/10
The optimization of the Harley algorithm is an active area
of hyperelliptic curve cryptography. We propose an efficient method for
software implementation of genus three Harley algorithm over F2n. O...
Efficient Implementation of Tate Pairing on a Mobile Phone using Java
Tate Pairing Mobile Phone Java
2008/12/16
Efficient Implementation of Tate Pairing on a Mobile Phone using Java.