Small units like chip cards (smart card) have the possibility of computing, storing and protecting data. Today such chip cards have limited computing power and some cryptoprotocols are too slow. Some new chip cards with secure coprocessors are coming but are not very reliable at the moment and a little bit expensive. A possible alternative solution is to use an auxiliary unit in order to help the chip card. The known protocols are not very secure or are not efficient. We show how to accelerate the computation of a x b mod c and of a(t) mod c where a, b, c, t are public. Next we show how to accelerate the discrete exponential module a prime number: this protocol is useful to accelerate DSS signatures and other schemes. This protocol is also ...
Modern cryptography responds to the need for security that has arisen with the emergence of communic...
. Server-Aided Secret Computation(SASC) protocol enables the client(smart card) to borrow the comput...
In this work we compute the energy generated by modular exponentiation, a widely used powerful tool ...
Small units like chip cards have the possibility of computing, storing and protecting data. Today su...
Treats the problem how small devices such as smart cards can efficiently compute signatures, execute...
Abstract. TTS is a genre of multivariate digital signature schemes first proposed in 2002. Its publi...
We demonstrate how 1-of-n encoded speed-independent circuits provide a good framework for constructi...
Abstract. Ensuring the physical security of small embedded devices is challenging. Such devices have...
[[abstract]]TTS is a genre of multivariate digital signature schemes first proposed in 2002. Its pub...
In most currently used public-key cryptographic systems, including those based on the difficulty to ...
Differential Power Analysis (DPA) attacks extract the secret key of cryptographic algorithm, by anal...
An existing approach based on induction and theorem proving is tailored to the verification of secur...
Differential Power Analysis (DPA) attacks extract the secret key of cryptographic algorithm, by anal...
Differential Power Analysis (DPA) attacks extract the secret key of cryptographic algorithm, by anal...
This paper concentrates on the hardware implementation of efficient and re- configurable elliptic cu...
Modern cryptography responds to the need for security that has arisen with the emergence of communic...
. Server-Aided Secret Computation(SASC) protocol enables the client(smart card) to borrow the comput...
In this work we compute the energy generated by modular exponentiation, a widely used powerful tool ...
Small units like chip cards have the possibility of computing, storing and protecting data. Today su...
Treats the problem how small devices such as smart cards can efficiently compute signatures, execute...
Abstract. TTS is a genre of multivariate digital signature schemes first proposed in 2002. Its publi...
We demonstrate how 1-of-n encoded speed-independent circuits provide a good framework for constructi...
Abstract. Ensuring the physical security of small embedded devices is challenging. Such devices have...
[[abstract]]TTS is a genre of multivariate digital signature schemes first proposed in 2002. Its pub...
In most currently used public-key cryptographic systems, including those based on the difficulty to ...
Differential Power Analysis (DPA) attacks extract the secret key of cryptographic algorithm, by anal...
An existing approach based on induction and theorem proving is tailored to the verification of secur...
Differential Power Analysis (DPA) attacks extract the secret key of cryptographic algorithm, by anal...
Differential Power Analysis (DPA) attacks extract the secret key of cryptographic algorithm, by anal...
This paper concentrates on the hardware implementation of efficient and re- configurable elliptic cu...
Modern cryptography responds to the need for security that has arisen with the emergence of communic...
. Server-Aided Secret Computation(SASC) protocol enables the client(smart card) to borrow the comput...
In this work we compute the energy generated by modular exponentiation, a widely used powerful tool ...