International audienceDesigning accelerators or blocks for security and cryptography in hardware usually leads to mode efficient and secure solutions than pure software implementations. But this can also lead to a flexibility problem: e.g. limited updates and adaptation to various security levels. We will present some ideas and results on the design of cryptoprocessors mixing hardware efficiency (speed, energy and security) and software flexibility in the case of elliptic curve cryptography for embedded systems
Over the past five years we have developed two open source software packages called GHOST and PHIST ...
International audienceThe paper describes a new RNS (residue number system) modular multiplication a...
Contrairement aux protocoles cryptographiques fondés sur la théorie des nombres, les systèmes de chi...
International audiencePublic key cryptography is required in many applications such as key exchange,...
Invited presentation at the SPEC (Service de Physique de l'Etat Condensé) seminar at CEA Saclay,Comp...
International audienceIn typical applications of homomorphic encryption, the rststep consists for Al...
A transmitter device (110T) for secure communication includes: an encoder (170) configured to apply ...
International audienceElliptic curve cryptography (ECC) is the current main standard for asymmetric ...
The purpose of this paper is to provide a comprehensive security analysis for the parameter selectio...
International audienceDesigners of concurrent and distributed algorithms usually express them using ...
International audienceThis document introduces a class of linear codes, derived from Random Linear C...
The microcomputer array system is discussed with specific attention given to its electronic warware ...
PMI 是去年在 “International Workshop on Practice and Theory in Public Key Cryptography” 的會議上,由辛辛那提大學的丁津泰...
The topics are presented in viewgraph form and include the following: semiconductor bridge technolog...
The encrypted key exchange (EKE) protocol is augmented so that hosts do not store cleartext password...
Over the past five years we have developed two open source software packages called GHOST and PHIST ...
International audienceThe paper describes a new RNS (residue number system) modular multiplication a...
Contrairement aux protocoles cryptographiques fondés sur la théorie des nombres, les systèmes de chi...
International audiencePublic key cryptography is required in many applications such as key exchange,...
Invited presentation at the SPEC (Service de Physique de l'Etat Condensé) seminar at CEA Saclay,Comp...
International audienceIn typical applications of homomorphic encryption, the rststep consists for Al...
A transmitter device (110T) for secure communication includes: an encoder (170) configured to apply ...
International audienceElliptic curve cryptography (ECC) is the current main standard for asymmetric ...
The purpose of this paper is to provide a comprehensive security analysis for the parameter selectio...
International audienceDesigners of concurrent and distributed algorithms usually express them using ...
International audienceThis document introduces a class of linear codes, derived from Random Linear C...
The microcomputer array system is discussed with specific attention given to its electronic warware ...
PMI 是去年在 “International Workshop on Practice and Theory in Public Key Cryptography” 的會議上,由辛辛那提大學的丁津泰...
The topics are presented in viewgraph form and include the following: semiconductor bridge technolog...
The encrypted key exchange (EKE) protocol is augmented so that hosts do not store cleartext password...
Over the past five years we have developed two open source software packages called GHOST and PHIST ...
International audienceThe paper describes a new RNS (residue number system) modular multiplication a...
Contrairement aux protocoles cryptographiques fondés sur la théorie des nombres, les systèmes de chi...