Embedded exponentiation techniques have become a key concern for security and efficiency in hardware devices using public key cryptography. An exponentiation is basically a sequence of multiplications and squarings, but this sequence may reveal exponent bits to an attacker on an unprotected implementation. Although this subject has been covered for years, we present in this paper new exponentiation algorithms based on trading multiplications for squarings. Our method circumvents attacks aimed at distinguishing squarings from multiplications at a lower cost than previous techniques. Last but not least, we present new algorithms using two parallel squaring blocks which provide the fastest exponentiation to our knowledge
Maintaining the privacy and security of people information are two most important principles of elec...
A series of algorithms for evaluation of multi-exponentiation are proposed based on the binary great...
Public-key cryptosystems are broadly employed to provide security for digital information. Improving...
Abstract. Embedded exponentiation techniques have become a key concern for security and efficiency i...
International audienceEmbedded exponentiation techniques have become a key concern for security and ...
In order to prevent the SPA (Simple Power Analysis) attack against modular exponentiation algorithms...
. A modular exponentiation is one of the most important operations in public-key cryptography. Howev...
Abstract. This paper describes methods of recoding exponents to allow for regular implementations of...
Abstract. Public key cryptographic algorithms are typically based on group exponentiation algorithms...
We consider the problem of minimizing the number of multiplications in computing f(x)=x n , where n ...
Most implementations of public key cryptography employ exponentiation algorithms. Side-channel attac...
We present protocols for speeding up fixed-base exponentiation and variable-base exponentiation usin...
RSA is a commonly used asymmetric key cryptosystem that is used in encrypting and signing messages. ...
This paper introduces simple methods to convert a cryptographic algorithm into an algorithm protecte...
High performance implementation of single exponentiation in finite field is crucial for cryptographi...
Maintaining the privacy and security of people information are two most important principles of elec...
A series of algorithms for evaluation of multi-exponentiation are proposed based on the binary great...
Public-key cryptosystems are broadly employed to provide security for digital information. Improving...
Abstract. Embedded exponentiation techniques have become a key concern for security and efficiency i...
International audienceEmbedded exponentiation techniques have become a key concern for security and ...
In order to prevent the SPA (Simple Power Analysis) attack against modular exponentiation algorithms...
. A modular exponentiation is one of the most important operations in public-key cryptography. Howev...
Abstract. This paper describes methods of recoding exponents to allow for regular implementations of...
Abstract. Public key cryptographic algorithms are typically based on group exponentiation algorithms...
We consider the problem of minimizing the number of multiplications in computing f(x)=x n , where n ...
Most implementations of public key cryptography employ exponentiation algorithms. Side-channel attac...
We present protocols for speeding up fixed-base exponentiation and variable-base exponentiation usin...
RSA is a commonly used asymmetric key cryptosystem that is used in encrypting and signing messages. ...
This paper introduces simple methods to convert a cryptographic algorithm into an algorithm protecte...
High performance implementation of single exponentiation in finite field is crucial for cryptographi...
Maintaining the privacy and security of people information are two most important principles of elec...
A series of algorithms for evaluation of multi-exponentiation are proposed based on the binary great...
Public-key cryptosystems are broadly employed to provide security for digital information. Improving...