<--- Back to Details
First PageDocument Content
Modular arithmetic / Computer arithmetic / Public-key cryptography / Electronic commerce / Modular exponentiation / Exponentials / Montgomery reduction / RSA / Timing attack / Cryptography / Abstract algebra / Mathematics
Date: 2010-04-23 16:59:43
Modular arithmetic
Computer arithmetic
Public-key cryptography
Electronic commerce
Modular exponentiation
Exponentials
Montgomery reduction
RSA
Timing attack
Cryptography
Abstract algebra
Mathematics

Add to Reading List

Source URL: www.cryptography.com

Download Document from Source Website

File Size: 206,71 KB

Share Document on Facebook

Similar Documents

Cryptography / Cryptographic software / OpenPGP / Side-channel attacks / E-commerce / RSA / Modular exponentiation / Chosen-ciphertext attack / ElGamal encryption / Adaptive chosen-ciphertext attack / Electromagnetic attack / Public-key cryptography

Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

DocID: 1qxjY - View Document

Cryptography / Modular arithmetic / Cryptographic software / E-commerce / OpenSSL / RSA / Public-key cryptography / Modular exponentiation / Montgomery modular multiplication / Timing attack / Side-channel attack / Data Encryption Standard

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

DocID: 1qufy - View Document

Modular forms / Mathematical analysis / Mathematics / Abstract algebra / Operator theory / Binary operations / Overconvergent modular form / Exponentiation / P-adic modular form / Operator / Base

211 Documenta Math. The 2-adic Eigencurve is Proper. Kevin Buzzard1 and Frank Calegari2

DocID: 1q07W - View Document

Modular forms / Operator theory / Binary operations / Overconvergent modular form / Exponentiation / P-adic modular form / Operator / Base

211 Documenta Math. The 2-adic Eigencurve is Proper. Kevin Buzzard1 and Frank Calegari2

DocID: 1oUvx - View Document

Computer arithmetic / Modular arithmetic / Central processing unit / Search algorithms / Exponentials / Exponentiation by squaring / Montgomery modular multiplication / Hash function / Processor register / 64-bit computing / Euclidean vector

Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

DocID: 1mm6z - View Document