搜索结果: 1-13 共查到“军队指挥学 Software implementation”相关记录13条 . 查询时间(0.143 秒)
A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol
SIDH protocol Montgomery ladder post-quantum cryptography
2017/10/19
Since its introduction by Jao and De Feo in 2011, the supersingular isogeny Diffie-Hellman (SIDH) key exchange protocol has positioned itself as a promising candidate for post-quantum cryptography. On...
Software Implementation of 2-Depth Pairing-based Homomorphic Encryption Scheme
homomorphic encryption pairing-based cryptography
2017/2/20
We propose a software implementation of a variant of Boneh-Goh-Nissim scheme \cite{BGN05} with multiplicative depth 22, {whereas the original one only tackled multiplicative depth 11}. We employ toget...
Software implementation of Koblitz curves over quadratic fields
landmark paper Software implementation
2016/6/12
In this work, we retake an old idea that Koblitz presented in his landmark paper, where he suggested the possibility of defining anomalous elliptic curves over the base field \F_4. We present a carefu...
Software implementation of an Attribute-Based Encryption scheme
attribute-based-encryption pairing-based protocols bilinear pairings
2016/1/9
A ciphertext-policy attribute-based encryption protocol uses bilinear pairings to provide control
access mechanisms, where the set of user’s attributes is specified by means of a linear secret sharin...
Present-day public-key cryptosystems such as RSA and Elliptic Curve
Cryptography (ECC) will become insecure when quantum computers become a
reality. This paper presents the new state of the art in e...
Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks
Side-channel attacks shuffling Keccak
2015/12/24
Side-channel attacks have been a real threat against many critical embedded systems that rely on cryptographic algorithms as their security engine. A commonly used algorithmic countermeasure, random m...
This paper presents an efficient and side channel protected software implementation of point multiplication for the standard NIST and SECG binary elliptic curves. The enhanced performance is achieved ...
Impact of Intel's New Instruction Sets on Software Implementation of $GF(2)[x]$ Multiplication
implementation / $GF(2)[x]$ multiplication Karatsuba Algorithm SSE AVX PCLMULQDQ
2012/3/22
PCLMULQDQ, a new instruction that supports $GF(2)[x]$ multiplication, was introduced by Intel in 2010. This instruction brings dramatic change to software implementation of multiplication in $GF(2^m)$...
Impact of Intel's New Instruction Sets on Software Implementation of $GF(2)[x]$ Multiplication
implementation / $GF(2)[x]$ multiplication Karatsuba Algorithm SSE AVX PCLMULQDQ
2012/3/21
PCLMULQDQ, a new instruction that supports $GF(2)[x]$ multiplication, was introduced by Intel in 2010. This instruction brings dramatic change to software implementation of multiplication in $GF(2^m)$...
Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication
Elliptic curve cryptography finite field arithmetic parallel algorithm efficient software implementation
2012/3/29
The availability of a new carry-less multiplication instruction in the latest Intel desktop processors significantly accelerates multiplication in binary fields and hence presents the opportunity for ...
High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves
Tate pairing optimal pairing Barreto{Naehrig curve ordinary curve
2010/7/14
This paper describes the design of a fast software library for the computation of the optimal ate pairing on a Barreto--Naehrig elliptic curve. Our library is able to compute the optimal ate pairing o...
Software Implementation of Genus-2 Hyperelliptic Curve Cryptosystems Over Prime Fields
Hyperelliptic curve divisor addition efficient implementation
2009/6/2
This paper describes the system parameters and software implementation of a HECDSA cryptosystem based on genus-2 hyperelliptic curves over prime fields. We show how to reduce the computational complex...
SECURE AND EFFICIENT AES SOFTWARE IMPLEMENTATION FOR SMART CARDS
AES Galois field field generator
2009/3/27
In implementing cryptographic algorithms on limited devices such
as smart cards, speed and memory optimization had always been a challenge.
With the advent of side channel attacks, this task became ...