<--- Back to Details
First PageDocument Content
Public-key cryptography / Computer arithmetic / Electronic commerce / RSA / Paillier cryptosystem / Modular exponentiation / Exponentiation by squaring / Chinese remainder theorem / Montgomery reduction / Cryptography / Mathematics / Modular arithmetic
Date: 2012-06-05 18:18:05
Public-key cryptography
Computer arithmetic
Electronic commerce
RSA
Paillier cryptosystem
Modular exponentiation
Exponentiation by squaring
Chinese remainder theorem
Montgomery reduction
Cryptography
Mathematics
Modular arithmetic

A Method for Preventing "Skipping" Attacks

Add to Reading List

Source URL: ieee-security.org

Download Document from Source Website

File Size: 380,29 KB

Share Document on Facebook

Similar Documents

Computer arithmetic / Modular arithmetic / Central processing unit / Search algorithms / Exponentials / Exponentiation by squaring / Montgomery modular multiplication / Hash function / Processor register / 64-bit computing / Euclidean vector

Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

DocID: 1mm6z - View Document

Computer arithmetic / Binary arithmetic / Exponentials / Coding theory / Hamming weight / Exponentiation by squaring / Binary number / Integer / Division algorithm / Exponentiation

de Bordeaux), 27{41

DocID: 1lUq8 - View Document

Computer arithmetic / Modular arithmetic / Finite fields / Multiplication / E-commerce / RSA / Exponentiation by squaring / Montgomery modular multiplication / Modular exponentiation / Timing attack / Multiplication algorithm / XTR

Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations Onur Acıic¸mez Werner Schindler

DocID: 1lG8K - View Document

Public-key cryptography / Modular arithmetic / Computer arithmetic / Electronic commerce / RSA / Modular exponentiation / Montgomery reduction / Exponentiation by squaring / Eternity II puzzle / Cryptography / Mathematics / Abstract algebra

Offline Submission with RSA Time-Lock Puzzles Yves Igor Jerschow Martin Mauve

DocID: 1g8mg - View Document

Search algorithms / Modular arithmetic / Exponentials / Exponentiation by squaring / Montgomery reduction / Hash function / 64-bit / Euclidean vector / Mathematics / Algebra / Computer arithmetic

Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

DocID: 1aTy8 - View Document