- Algorithms and arithmetic operators for computing the eta(T) pairing in characteristic three
[作者:Beuchat, JL; Brisebarre, N; Detrey, J; Okamoto, E; Shirase, M; Takagi, T,期刊:IEEE Transactions on Computers, 页码:1454-1468 , 文章类型: Article,,卷期:2008年57-11]
- Since their introduction in constructive cryptographic applications, pairings over (hyper) elliptic curves are at the heart of an ever increasing number of protocols. With software implementations being rather slow, the ...
- Security evaluation of WDDL and SecLib countermeasures against power attacks
[作者:Guilley, S; Sauvage, L; Hoogvorst, P; Pacalet, R; Bertoni, GM; Chaudhuri, S,期刊:IEEE Transactions on Computers, 页码:1482-1497 , 文章类型: Article,,卷期:2008年57-11]
- Logic styles with constant power consumption are promising solutions to counteract side-channel attacks on sensitive cryptographic devices. Recently, one vulnerability has been identified in a standard-cell-based power-c...
- Elliptic-curve-based security processor for RFID
[作者:Lee, YK; Sakiyama, K; Batina, L; Verbauwhede, I,期刊:IEEE Transactions on Computers, 页码:1514-1527 , 文章类型: Article,,卷期:2008年57-11]
- Radio Frequency IDentification (RFID) tags need to include security functions, yet at the same time, their resources are extremely limited. Moreover, to provide privacy, authentication, and protection against tracking of...
- Cryptanalysis with COPACOBANA
[作者:Guneysu, T; Kasper, T; Novotny, M; Paar, C; Rupp, A,期刊:IEEE Transactions on Computers, 页码:1498-1513 , 文章类型: Article,,卷期:2008年57-11]
- Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with available computing resources. Thus, in the abse...
- Configurable flash-memory management: Performance versus overheads
[作者:Hsieh, JW; Tsai, YL; Kuo, TW; Lee, TL,期刊:IEEE Transactions on Computers, 页码:1571-1583 , 文章类型: Article,,卷期:2008年57-11]
- Flash memory has been widely adopted in various consumer products for information storage, especially for embedded systems. With strong demands on product designs for overhead control and performance requirements, vendor...
|