Exponentiation by squaring

Results: 24



#Item
1Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2015-09-06 14:08:28
2de Bordeaux), 27{41

de Bordeaux), 27{41

Add to Reading List

Source URL: www.math.ru.nl

Language: English - Date: 2011-09-21 10:12:03
3Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations Onur Acıic¸mez Werner Schindler

Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations Onur Acıic¸mez Werner Schindler

Add to Reading List

Source URL: tls.mbed.org

Language: English - Date: 2016-01-19 07:39:30
4Offline Submission with RSA Time-Lock Puzzles Yves Igor Jerschow Martin Mauve

Offline Submission with RSA Time-Lock Puzzles Yves Igor Jerschow Martin Mauve

Add to Reading List

Source URL: wwwcn.cs.uni-duesseldorf.de

Language: English - Date: 2014-01-09 02:12:40
5Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2015-05-18 18:18:01
6FHE-MPC Notes Lecturer: Marcel Keller Scribe: Enrique Larraia Lecture # 9 5th December 2011

FHE-MPC Notes Lecturer: Marcel Keller Scribe: Enrique Larraia Lecture # 9 5th December 2011

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2011-12-08 13:25:50
7A Method for Preventing

A Method for Preventing "Skipping" Attacks

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2012-06-05 18:18:05
8Cryptology ePrint Archive, Report, http://eprint.iacr.org/ Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification Bodo M¨oller and Andy Rupp

Cryptology ePrint Archive, Report, http://eprint.iacr.org/ Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification Bodo M¨oller and Andy Rupp

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2008-05-19 15:51:37
91  Square root computation over even extension fields Gora Adj 1

1 Square root computation over even extension fields Gora Adj 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-07-18 17:22:53
10Appears in P. J. Lee, C. H. Lim (Eds.): Information Security and Cryptology – ICISC 2002, Springer-Verlag LNCS 2587, pp. 298–312, ISBN, 2003. Improved Techniques for Fast Exponentiation Bodo M¨oller Te

Appears in P. J. Lee, C. H. Lim (Eds.): Information Security and Cryptology – ICISC 2002, Springer-Verlag LNCS 2587, pp. 298–312, ISBN, 2003. Improved Techniques for Fast Exponentiation Bodo M¨oller Te

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:24:26