Modular exponentiation

Results: 38



#Item
1Cryptography / Cryptographic software / OpenPGP / Side-channel attacks / E-commerce / RSA / Modular exponentiation / Chosen-ciphertext attack / ElGamal encryption / Adaptive chosen-ciphertext attack / Electromagnetic attack / Public-key cryptography

Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2015-03-03 02:38:59
2Cryptography / Modular arithmetic / Cryptographic software / E-commerce / OpenSSL / RSA / Public-key cryptography / Modular exponentiation / Montgomery modular multiplication / Timing attack / Side-channel attack / Data Encryption Standard

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
3Modular forms / Mathematical analysis / Mathematics / Abstract algebra / Operator theory / Binary operations / Overconvergent modular form / Exponentiation / P-adic modular form / Operator / Base

211 Documenta Math. The 2-adic Eigencurve is Proper. Kevin Buzzard1 and Frank Calegari2

Add to Reading List

Source URL: www.math.uiuc.edu

Language: English - Date: 2006-11-21 15:14:20
4Modular forms / Operator theory / Binary operations / Overconvergent modular form / Exponentiation / P-adic modular form / Operator / Base

211 Documenta Math. The 2-adic Eigencurve is Proper. Kevin Buzzard1 and Frank Calegari2

Add to Reading List

Source URL: documenta.sagemath.org

Language: English - Date: 2006-11-21 15:14:20
5Computer arithmetic / Modular arithmetic / Central processing unit / Search algorithms / Exponentials / Exponentiation by squaring / Montgomery modular multiplication / Hash function / Processor register / 64-bit computing / Euclidean vector

Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2015-09-06 14:08:28
6Cryptography / E-commerce / RSA / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding / Modular exponentiation / Ciphertext / Cryptanalysis / BlumGoldwasser cryptosystem / Rabin cryptosystem

Bug Attacks Eli Biham1 Yaniv Carmeli1 Adi Shamir2

Add to Reading List

Source URL: iacr.org

Language: English - Date: 2010-11-05 17:58:40
7Computer arithmetic / Modular arithmetic / Finite fields / Multiplication / E-commerce / RSA / Exponentiation by squaring / Montgomery modular multiplication / Modular exponentiation / Timing attack / Multiplication algorithm / XTR

Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations Onur Acıic¸mez Werner Schindler

Add to Reading List

Source URL: tls.mbed.org

Language: English - Date: 2016-01-19 07:39:30
8Public-key cryptography / Computer security / DolevYao model / DiffieHellman key exchange / Cryptographic protocol / RSA / Exponentiation / DiffieHellman problem / Modular exponentiation

1 On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol M ARZIA B USCEMI, University of Pisa

Add to Reading List

Source URL: www.qatar.cmu.edu

Language: English - Date: 2004-12-05 23:21:27
9Cryptography / Modular arithmetic / Cryptographic software / E-commerce / OpenSSL / RSA / Public-key cryptography / Modular exponentiation / Montgomery modular multiplication / Timing attack / Side-channel attack / Data Encryption Standard

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: tls.mbed.org

Language: English
10Abstract algebra / Algebra / Mathematics / Modular arithmetic / Computer arithmetic / Binary operations / E-commerce / RSA / Modular exponentiation / Montgomery modular multiplication / Vienna U-Bahn / Modulo operation

A Timing Attack against RSA with the Chinese Remainder Theorem Werner Schindler Bundesamt f¨ ur Sicherheit in der Informationstechnik (BSI) Godesberger Allee 183, 53175 Bonn, Germany

Add to Reading List

Source URL: tls.mbed.org

Language: English
UPDATE