Abstract—Graphics processing units (GPUs) have become increasingly popular over the last years as a cost-effective means of accelerating various computationally intensive tasks. We study the particular case of modular exponentiation, the crucial opera-tion behind most modern public-key cryptography algorithms. We focus our attention on the NVIDIA GT200 architecture, currently one of the most popular for general purpose GPU computation. We report our efforts to run modular exponentiation faster than any other method we were aware of for GPUs. Part of our performance advantage results from a different variation of the Montgomery multiplication, which was neglected in previous literature. The other part comes from carefully exploring general t...
Problem description: Most public key algorithms are based on modular arithmetic. The simplest, and o...
ISBN 978-1-4577-1416-0International audienceHigh-bandwidth secure channels require a lot of computin...
The Elliptic Curve Method (ECM) is the method of choice for nding medium-size prime factors. A good...
In the field of cryptography, public key algorithms are widely known to be slower than symmetric key...
Cryptography, the science of writing secrets, has been used for centuries to conceal information fro...
International audienceWe present below our first implementation results on a modular arithmetic libr...
[Updated version of paper at Indocrypt 2010] A major cryptanalytic computation is currently underway...
Evaluating non-linear multivariate polynomial systems over finite fields is an important subroutine ...
In most currently used public-key cryptographic systems, including those based on the difficulty to ...
International audience—Acceleration of cryptographic applications on Graphical Processing Units (GPU...
Multiple precision (MP) arithmetic is a core building block of a wide variety of algorithms in compu...
Maintaining the privacy and security of people information are two most important principles of elec...
Abstract—RSA encryption is one of the most well known algo-rithms for public-key cryptography. This ...
One frequently cited reason for the lack of wide deployment of cryptographic protocols is the (perce...
Context. The cryptographically secure pseudo-random number generator Blum Blum Shub (BBS) is a simpl...
Problem description: Most public key algorithms are based on modular arithmetic. The simplest, and o...
ISBN 978-1-4577-1416-0International audienceHigh-bandwidth secure channels require a lot of computin...
The Elliptic Curve Method (ECM) is the method of choice for nding medium-size prime factors. A good...
In the field of cryptography, public key algorithms are widely known to be slower than symmetric key...
Cryptography, the science of writing secrets, has been used for centuries to conceal information fro...
International audienceWe present below our first implementation results on a modular arithmetic libr...
[Updated version of paper at Indocrypt 2010] A major cryptanalytic computation is currently underway...
Evaluating non-linear multivariate polynomial systems over finite fields is an important subroutine ...
In most currently used public-key cryptographic systems, including those based on the difficulty to ...
International audience—Acceleration of cryptographic applications on Graphical Processing Units (GPU...
Multiple precision (MP) arithmetic is a core building block of a wide variety of algorithms in compu...
Maintaining the privacy and security of people information are two most important principles of elec...
Abstract—RSA encryption is one of the most well known algo-rithms for public-key cryptography. This ...
One frequently cited reason for the lack of wide deployment of cryptographic protocols is the (perce...
Context. The cryptographically secure pseudo-random number generator Blum Blum Shub (BBS) is a simpl...
Problem description: Most public key algorithms are based on modular arithmetic. The simplest, and o...
ISBN 978-1-4577-1416-0International audienceHigh-bandwidth secure channels require a lot of computin...
The Elliptic Curve Method (ECM) is the method of choice for nding medium-size prime factors. A good...