×

Found 21 Documents (Results 1–21)

Parallelized software implementation of elliptic curve scalar multiplication. (English) Zbl 1403.94075

Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 445-462 (2015).
PDFBibTeX XMLCite
Full Text: DOI HAL

Fast implementation of Curve25519 using AVX2. (English) Zbl 1378.94040

Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 329-345 (2015).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Montgomery multiplication using vector instructions. (English) Zbl 1362.94022

Lange, Tanja (ed.) et al., Selected areas in cryptography – SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14–16, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). Lecture Notes in Computer Science 8282, 471-489 (2014).
MSC:  94A60 68M07
PDFBibTeX XMLCite
Full Text: DOI

Faster repeated doublings on binary elliptic curves. (English) Zbl 1362.94028

Lange, Tanja (ed.) et al., Selected areas in cryptography – SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14–16, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). Lecture Notes in Computer Science 8282, 456-470 (2014).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Security analysis of multilinear maps over the integers. (English) Zbl 1343.94069

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 224-240 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical cryptanalysis of a public-key encryption scheme based on new multivariate quadratic assumptions. (English) Zbl 1288.94049

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 446-464 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

PandA: pairings and arithmetic. (English) Zbl 1307.94049

Cao, Zhenfu (ed.) et al., Pairing-based cryptography – Pairing 2013. 6th international conference, Beijing, China, November 22–24, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-319-04872-7/pbk). Lecture Notes in Computer Science 8365, 229-250 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improvement of lattice-based cryptography using CRT. (English) Zbl 1205.81073

Sergienko, Alexander (ed.) et al., Quantum communication and quantum networking. First international conference, QuantumComm 2009, Naples, Italy, October 26–30, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-11730-5/pbk; 978-3-642-11731-2/ebook). Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 36, 275-282 (2010).
MSC:  81P94 94A60
PDFBibTeX XMLCite
Full Text: DOI

Hash functions from sigma protocols and improvements to VSH. (English) Zbl 1206.94053

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 125-142 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Perturbating RSA public keys: an improved attack. (English) Zbl 1315.94056

Oswald, Elisabeth (ed.) et al., Cryptographic hardware and embedded systems – CHES 2008. 10th international workshop, Washington, D.C., USA, August 10–13, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85052-6/pbk). Lecture Notes in Computer Science 5154, 380-395 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Skew Frobenius map and efficient scalar multiplication for pairing-based cryptography. (English) Zbl 1362.94049

Franklin, Matthew K. (ed.) et al., Cryptology and network security. 7th international conference, CANS 2008, Hong-Kong, China, December 2–4, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89640-1/pbk). Lecture Notes in Computer Science 5339, 226-239 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software