First Page | Document Content | |
---|---|---|
Date: 2012-06-05 18:18:05Public-key cryptography Computer arithmetic Electronic commerce RSA Paillier cryptosystem Modular exponentiation Exponentiation by squaring Chinese remainder theorem Montgomery reduction Cryptography Mathematics Modular arithmetic | A Method for Preventing "Skipping" AttacksAdd to Reading ListSource URL: ieee-security.orgDownload Document from Source WebsiteFile Size: 380,29 KBShare Document on Facebook |
Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashingDocID: 1mm6z - View Document | |
de Bordeaux), 27{41DocID: 1lUq8 - View Document | |
Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations Onur Acıic¸mez Werner SchindlerDocID: 1lG8K - View Document | |
Offline Submission with RSA Time-Lock Puzzles Yves Igor Jerschow Martin MauveDocID: 1g8mg - View Document | |
Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashingDocID: 1aTy8 - View Document |