Secure Binary Field Multiplication
暂无分享,去创建一个
Zhe Liu | Hwajeong Seo | Taehwan Park | Howon Kim | Yasuyuki Nogami | Jongseok Choi | Chien-Ning Chen | Zhe Liu | Y. Nogami | Howon Kim | Jongseok Choi | Hwajeong Seo | Chien-Ning Chen | Taehwan Park
[1] Thomas S. Messerges,et al. Investigations of Power Analysis Attacks on Smartcards , 1999, Smartcard.
[2] Ricardo Dahab,et al. NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks , 2008, EWSN.
[3] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[4] Masaaki Shirase,et al. Efficient Implementation of Pairing-Based Cryptography on a Sensor Node , 2009, IEICE Trans. Inf. Syst..
[5] Michael E. Kounavis,et al. Multiplication Instruction and its Usage for Computing the GCM Mode , 2010 .
[6] Ricardo Dahab,et al. High-Speed Software Multiplication in F2m , 2000, INDOCRYPT.
[7] Zhe Liu,et al. Karatsuba-Block-Comb technique for elliptic curve cryptography over binary fields , 2015, Secur. Commun. Networks.
[8] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[9] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[10] Hermann Seuschek,et al. Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography , 2008, IACR Cryptol. ePrint Arch..
[11] Julio César López-Hernández,et al. Implementing GCM on ARMv8 , 2015, CT-RSA.
[12] Shay Gueron,et al. AES-GCM software performance on the current high end CPUs as a performance baseline for CAESAR competition , 2013 .
[13] Ricardo Dahab,et al. TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks , 2008, 2008 5th International Conference on Networked Sensing Systems.
[14] Christophe Clavier,et al. Horizontal Correlation Analysis on Exponentiation , 2010, ICICS.
[15] Ricardo Dahab,et al. Efficient implementation of elliptic curve cryptography in wireless sensors , 2010, Adv. Math. Commun..
[16] Hyunjin Kim,et al. Binary and prime field multiplication for public key cryptography on embedded microprocessors , 2014, Secur. Commun. Networks.
[17] Chien-Ning Chen,et al. Memory Address Side-Channel Analysis on Exponentiation , 2014, ICISC.
[18] Seokhie Hong,et al. TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote , 2008, IEICE Trans. Inf. Syst..
[19] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.