Rivest-Shamir-Adleman (RSA) is a widely used public key cryptographic method. The main operation performed in this method, for encryption and decryption, is modular exponentiation. The way modular exponentiation is computed make the system vulnerable to sidechannel attacks. Side-channel attacks focus on the physical implementation rather than in the algorithms vulnerabilities. In particular, power analysis attacks are a type of sidechannel attack that focuses on extracting information from the power consumption trace. The main thesis goals are to design, verify and obtain the specifications of a Simple Power Analysis (SPA) resistant coprocessor. A coprocessor and the hardware design are introduced because the case of study in this thesis re...
We present a fast, efficient, and parameterized modular multiplier and a secure exponentiation circu...
This report summarizes the work that was initiated from the summer of 2008, on the study and analysi...
Modular exponentiation is the basis needed to perform RSA encryption and decryption. Execution of 40...
Rivest-Shamir-Adleman (RSA) is a widely used public key cryptographic method. The main operation per...
Rivest-Shamir-Adelman (RSA) algorithm is one of the state-of-art publickey cryptography that is effi...
AbstractRSA Cryptosystem is considered the first practicable secure algorithm that can be used to pr...
The modular exponentiation operation used in popular public key encryption schemes, such as RSA, has...
[[abstract]]In order to achieve sufficient security in a public-key cryptosystem, the numbers involv...
In the age of information, security issues play a crucial role. Security comes with three points’ co...
[[abstract]]In this paper, a new efficient VLSI architecture to compute modular exponentiation and m...
This Ph.D. thesis treats the calculation of modular exponentials using very large operands. Through ...
In this paper we describe an efficient and secure hardware implementation of the RSA cryptosystem. M...
[[abstract]]© 1999 Institute of Electrical and Electronics Engineers - This paper presents a new bit...
De nos jours, les concepteurs de dispositifs cryptographiques doivent non seulement mettre en œuvre ...
This paper presents an hardware accelerator which can effectively improve the security and the perfo...
We present a fast, efficient, and parameterized modular multiplier and a secure exponentiation circu...
This report summarizes the work that was initiated from the summer of 2008, on the study and analysi...
Modular exponentiation is the basis needed to perform RSA encryption and decryption. Execution of 40...
Rivest-Shamir-Adleman (RSA) is a widely used public key cryptographic method. The main operation per...
Rivest-Shamir-Adelman (RSA) algorithm is one of the state-of-art publickey cryptography that is effi...
AbstractRSA Cryptosystem is considered the first practicable secure algorithm that can be used to pr...
The modular exponentiation operation used in popular public key encryption schemes, such as RSA, has...
[[abstract]]In order to achieve sufficient security in a public-key cryptosystem, the numbers involv...
In the age of information, security issues play a crucial role. Security comes with three points’ co...
[[abstract]]In this paper, a new efficient VLSI architecture to compute modular exponentiation and m...
This Ph.D. thesis treats the calculation of modular exponentials using very large operands. Through ...
In this paper we describe an efficient and secure hardware implementation of the RSA cryptosystem. M...
[[abstract]]© 1999 Institute of Electrical and Electronics Engineers - This paper presents a new bit...
De nos jours, les concepteurs de dispositifs cryptographiques doivent non seulement mettre en œuvre ...
This paper presents an hardware accelerator which can effectively improve the security and the perfo...
We present a fast, efficient, and parameterized modular multiplier and a secure exponentiation circu...
This report summarizes the work that was initiated from the summer of 2008, on the study and analysi...
Modular exponentiation is the basis needed to perform RSA encryption and decryption. Execution of 40...