First Page | Document Content | |
---|---|---|
![]() Date: 2014-05-29 15:38:01Cryptography E-commerce Cryptographic software RSA OpenSSL Modular arithmetic Timing attack Side-channel attack Montgomery modular multiplication David Brumley Karatsuba algorithm Data Encryption Standard | Add to Reading List |
![]() | Computer Networks–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley aDocID: 1r5d7 - View Document |
![]() | Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timingDocID: 1qufy - View Document |
![]() | Trinomial bases and Chinese remaindering for modular polynomial multiplication ´ Eric Schost1 and Arash Hariri2 1DocID: 1qrAC - View Document |
![]() | Fast Arithmetic for Triangular Sets: from Theory to Practice Xin Li ORCCA, University of Western Ontario (UWO)DocID: 1qeh3 - View Document |
![]() | doicomjnl/bxr119DocID: 1oYqf - View Document |