Modular exponentiation

Results: 38



#Item
11Improved Cryptographic Puzzle Based on Modular Exponentiation Lakshmi Kuppusamy and Jothi Rangasamy Abstract Cryptographic puzzles are moderately hard–neither easy nor hard to solve—computational problems. They have

Improved Cryptographic Puzzle Based on Modular Exponentiation Lakshmi Kuppusamy and Jothi Rangasamy Abstract Cryptographic puzzles are moderately hard–neither easy nor hard to solve—computational problems. They have

Add to Reading List

Source URL: www.gwern.net

Language: English - Date: 2015-08-18 19:10:58
    12Power Analysis Attacks of Modular Exponentiation in Smartcards Thomas S. Messerges1, Ezzy A. Dabbish1, Robert H. Sloan2,3 1  Motorola Labs, Motorola

    Power Analysis Attacks of Modular Exponentiation in Smartcards Thomas S. Messerges1, Ezzy A. Dabbish1, Robert H. Sloan2,3 1 Motorola Labs, Motorola

    Add to Reading List

    Source URL: saluc.engr.uconn.edu

    Language: English - Date: 2006-02-02 13:44:17
      13Offline Submission with RSA Time-Lock Puzzles Yves Igor Jerschow Martin Mauve

      Offline Submission with RSA Time-Lock Puzzles Yves Igor Jerschow Martin Mauve

      Add to Reading List

      Source URL: wwwcn.cs.uni-duesseldorf.de

      Language: English - Date: 2014-01-09 02:12:40
      14The bottleneck in the quantum factoring algorithm; i.e., the piece of the factoring algorithm that consumes the most time and space, is modular exponentiation.

      The bottleneck in the quantum factoring algorithm; i.e., the piece of the factoring algorithm that consumes the most time and space, is modular exponentiation.

      Add to Reading List

      Source URL: www.cs.bham.ac.uk

      - Date: 2011-03-23 04:14:00
        15Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

        Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

        Add to Reading List

        Source URL: www.bolet.org

        Language: English - Date: 2015-05-18 18:18:01
        16A Method for Preventing

        A Method for Preventing "Skipping" Attacks

        Add to Reading List

        Source URL: ieee-security.org

        Language: English - Date: 2012-06-05 18:18:05
        17Journal of Cryptographic Engineering manuscript No. (will be inserted by the editor) A Preliminary FPGA Implementation and Analysis of Phatak’s Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number S

        Journal of Cryptographic Engineering manuscript No. (will be inserted by the editor) A Preliminary FPGA Implementation and Analysis of Phatak’s Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number S

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2014-12-18 10:27:44
        18Perl versiondocumentation - Math::BigInt::Calc  NAME Math::BigInt::Calc - Pure Perl module to support Math::BigInt  SYNOPSIS

        Perl versiondocumentation - Math::BigInt::Calc NAME Math::BigInt::Calc - Pure Perl module to support Math::BigInt SYNOPSIS

        Add to Reading List

        Source URL: perldoc.perl.org

        Language: English - Date: 2014-10-03 15:52:01
        19Perl versiondocumentation - Math::BigInt  NAME Math::BigInt - Arbitrary size integer/float math package  SYNOPSIS

        Perl versiondocumentation - Math::BigInt NAME Math::BigInt - Arbitrary size integer/float math package SYNOPSIS

        Add to Reading List

        Source URL: perldoc.perl.org

        Language: English - Date: 2014-10-03 15:50:46
        201  Square root computation over even extension fields Gora Adj 1

        1 Square root computation over even extension fields Gora Adj 1

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2013-07-18 17:22:53