Montgomery reduction

Results: 34



#Item
1

The Maryland-National Capital Park and Planning Commission Department of Parks, Montgomery County Fee Reduction Program Application Procedures

Add to Reading List

Source URL: www.montgomeryparks.org

    2Public-key cryptography / Modular arithmetic / Computer arithmetic / Electronic commerce / RSA / Modular exponentiation / Montgomery reduction / Exponentiation by squaring / Eternity II puzzle / Cryptography / Mathematics / Abstract algebra

    Offline Submission with RSA Time-Lock Puzzles Yves Igor Jerschow Martin Mauve

    Add to Reading List

    Source URL: wwwcn.cs.uni-duesseldorf.de

    Language: English - Date: 2014-01-09 02:12:40
    3Search algorithms / Modular arithmetic / Exponentials / Exponentiation by squaring / Montgomery reduction / Hash function / 64-bit / Euclidean vector / Mathematics / Algebra / Computer arithmetic

    Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

    Add to Reading List

    Source URL: www.bolet.org

    Language: English - Date: 2015-05-18 18:18:01
    4Public-key cryptography / Computer arithmetic / Electronic commerce / RSA / Paillier cryptosystem / Modular exponentiation / Exponentiation by squaring / Chinese remainder theorem / Montgomery reduction / Cryptography / Mathematics / Modular arithmetic

    A Method for Preventing "Skipping" Attacks

    Add to Reading List

    Source URL: ieee-security.org

    Language: English - Date: 2012-06-05 18:18:05
    5Computer arithmetic / Algebra / Residue number system / Montgomery reduction / Division / Algorithm / Multiplication algorithm / Integer / Modular exponentiation / Abstract algebra / Mathematics / Modular arithmetic

    Journal of Cryptographic Engineering manuscript No. (will be inserted by the editor) A Preliminary FPGA Implementation and Analysis of Phatak’s Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number S

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-12-18 10:27:44
    6RSA / Timing attack / Montgomery reduction / OpenSSL / Cipher / David Brumley / Multiplication algorithm / Side channel attack / Cryptography / Public-key cryptography / Electronic commerce

    Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2010-06-04 16:24:13
    7Modular arithmetic / Cache / Electronic commerce / Public-key cryptography / RSA / CPU cache / Side channel attack / Timing attack / Montgomery reduction / Cryptography / Computer architecture / Central processing unit

    A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat (August 22, 2007) Onur Acıi¸cmez1 and Werner Schindler2 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2007-08-26 13:51:19
    8Modular arithmetic / Public-key cryptography / Computer arithmetic / Electronic commerce / RSA / Blinding / Montgomery reduction / Modular multiplicative inverse / Euclidean algorithm / Cryptography / Mathematics / Abstract algebra

    New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures Onur Acıic¸mez1 , Shay Gueron2,3 , and Jean-Pierre Seifert4 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2007-02-06 20:58:58
    9Computer arithmetic / Mathematical notation / Algebraic structures / Mathematical structures / Multiplication / Montgomery reduction / Multiplication algorithm / Euclidean algorithm / XTR / Mathematics / Abstract algebra / Arithmetic

    New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers Zhe Liu and Johann Großsch¨adl University of Luxembourg, Laboratory of Algorithmics, Cryptology and Security (LACS), 6, rue Richard

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-04-20 19:34:09
    10Finite fields / Computability theory / Alan Turing / Turing reduction / Reduction / Diffie–Hellman problem / Theoretical computer science / Applied mathematics / Computational complexity theory

    AN OBSERVATION ABOUT VARIATIONS OF THE DIFFIE-HELLMAN ASSUMPTION R. BHASKAR, K. CHANDRASEKARAN, S. LOKAM, P.L. MONTGOMERY, R. VENKATESAN, AND Y. YACOBI Abstract. We generalize the Strong Boneh-Boyen (SBB) signature sche

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2008-12-16 15:26:16
    UPDATE