Montgomery reduction

Results: 34



#Item
1The Maryland-National Capital Park and Planning Commission Department of Parks, Montgomery County Fee Reduction Program Application Procedures

The Maryland-National Capital Park and Planning Commission Department of Parks, Montgomery County Fee Reduction Program Application Procedures

Add to Reading List

Source URL: www.montgomeryparks.org

    2Offline Submission with RSA Time-Lock Puzzles Yves Igor Jerschow Martin Mauve

    Offline Submission with RSA Time-Lock Puzzles Yves Igor Jerschow Martin Mauve

    Add to Reading List

    Source URL: wwwcn.cs.uni-duesseldorf.de

    Language: English - Date: 2014-01-09 02:12:40
    3Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

    Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

    Add to Reading List

    Source URL: www.bolet.org

    Language: English - Date: 2015-05-18 18:18:01
    4A Method for Preventing

    A Method for Preventing "Skipping" Attacks

    Add to Reading List

    Source URL: ieee-security.org

    Language: English - Date: 2012-06-05 18:18:05
    5Journal of Cryptographic Engineering manuscript No. (will be inserted by the editor) A Preliminary FPGA Implementation and Analysis of Phatak’s Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number S

    Journal of Cryptographic Engineering manuscript No. (will be inserted by the editor) A Preliminary FPGA Implementation and Analysis of Phatak’s Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number S

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-12-18 10:27:44
    6Remote Timing Attacks are Practical David Brumley Stanford University  Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

    Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2010-06-04 16:24:13
    7A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat (August 22, 2007) Onur Acıi¸cmez1 and Werner Schindler2 1

    A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat (August 22, 2007) Onur Acıi¸cmez1 and Werner Schindler2 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2007-08-26 13:51:19
    8New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures Onur Acıic¸mez1 , Shay Gueron2,3 , and Jean-Pierre Seifert4 1

    New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures Onur Acıic¸mez1 , Shay Gueron2,3 , and Jean-Pierre Seifert4 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2007-02-06 20:58:58
    9New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers Zhe Liu and Johann Großsch¨adl University of Luxembourg, Laboratory of Algorithmics, Cryptology and Security (LACS), 6, rue Richard

    New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers Zhe Liu and Johann Großsch¨adl University of Luxembourg, Laboratory of Algorithmics, Cryptology and Security (LACS), 6, rue Richard

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-04-20 19:34:09
    10AN OBSERVATION ABOUT VARIATIONS OF THE DIFFIE-HELLMAN ASSUMPTION R. BHASKAR, K. CHANDRASEKARAN, S. LOKAM, P.L. MONTGOMERY, R. VENKATESAN, AND Y. YACOBI  Abstract. We generalize the Strong Boneh-Boyen (SBB) signature sche

    AN OBSERVATION ABOUT VARIATIONS OF THE DIFFIE-HELLMAN ASSUMPTION R. BHASKAR, K. CHANDRASEKARAN, S. LOKAM, P.L. MONTGOMERY, R. VENKATESAN, AND Y. YACOBI Abstract. We generalize the Strong Boneh-Boyen (SBB) signature sche

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2008-12-16 15:26:16