History

Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 65 total

A correlation power analysis attack against Tate pairing on FPGA. (English)
Koch, Andreas (ed.) et al., Reconfigurable computing: architectures, tools and applications. 7th international symposium, ARC 2011, Belfast, UK, March 23‒25, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19474-0/pbk). Lecture Notes in Computer Science 6578, 340-349 (2011).
1
Using templates to distinguish multiplications from squaring operations (English)
IACR Cryptology ePrint Archive 2011, 236 (2011).
2
Network-on-chip interconnect for pairing-based cryptographic IP cores (English)
Journal of Systems Architecture - Embedded Systems Design 57, No. 1, 95-108 (2011).
3
A comparison on FPGA of modular multipliers suitable for elliptic curve cryptography over $GF(p)$ for specific p values (English)
FPL, 273-276 (2011).
4
A correlation power analysis attack against Tate pairing on FPGA (English)
ARC, 340-349 (2011).
5
A reconfigurable implementation of the Tate pairing computation over $GF(2^{m })$. (English)
Sirisuk, Phaophak (ed.) et al., Reconfigurable computing: Architectures, tools and applications. 6th international symposium, ARC 2010, Bangkok, Thailand, March 17‒19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12132-6/pbk). Lecture Notes in Computer Science 5992, 80-91 (2010).
6
A hardware wrapper for the SHA-3 hash algorithms (English)
IACR Cryptology ePrint Archive 2010, 124 (2010).
7
FPGA implementations of the round two SHA-3 candidates (English)
FPL, 400-407 (2010).
8
Validation of an automated seizure detection system on healthy babies - histogram-based energy normalization for montage mismatch compensation (English)
BIOSIGNALS, 312-317 (2010).
9
A reconfigurable implementation of the Tate pairing computation over {\it GF}$(2^{m})$ (English)
ARC, 80-91 (2010).
10
Low energy ASIC elliptic curve processor. (English)
J. Low Power Electron. 5, No. 1, 85-95 (2009).
11
Energy-efficient low duty cycle MAC protocol for wireless body area networks. (English)
IEEE Trans. Inf. Technol. Biomed. 13, No. 6, 915-925 (2009).
12
Unknown plaintext template attacks. (English)
Youm, Heung Youl (ed.) et al., Information security applications. 10th international workshop, WISA 2009, Busan, Korea, August 25‒27, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-10837-2/pbk). Lecture Notes in Computer Science 5932, 148-162 (2009).
13
Distinguishing multiplications from squaring operations. (English)
Avanzi, Roberto Maria (ed.) et al., Selected areas in cryptography. 15th international workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14‒15. Revised selected papers. Berlin: Springer (ISBN 978-3-642-04158-7/pbk). Lecture Notes in Computer Science 5381, 346-360 (2009).
14
Implementation attacks \& countermeasures. (English)
Joye, Marc (ed.) et al., Identity-based cryptography. Amsterdam: IOP Press (ISBN 978-1-58603-947-9/hbk). Cryptology and Information Security Series 2, 226-243 (2009).
15
Hardware implementation of pairings. (English)
Joye, Marc (ed.) et al., Identity-based cryptography. Amsterdam: IOP Press (ISBN 978-1-58603-947-9/hbk). Cryptology and Information Security Series 2, 207-225 (2009).
16
A hardware analysis of twisted Edwards curves for an elliptic curve cryptosystem. (English)
Becker, Jürgen (ed.) et al., Reconfigurable computing: Architectures, tools and applications. 5th international workshop, ARC 2009, Karlsruhe, Germany, March 16‒18, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00640-1/pbk). Lecture Notes in Computer Science 5453, 355-361 (2009).
17
Energy efficient elliptic curve processor. (English)
Svensson, Lars (ed.) et al., Integrated circuit and system design. Power and timing modeling, optimization and simulation. 18th international workshop, PATMOS 2008, Lisbon, Portugal, September 10‒12, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-95947-2/pbk). Lecture Notes in Computer Science 5349, 287-296 (2009).
18
A class of quasi-cyclic LDPC codes over $GF(2^{m})$ (English)
IEEE Transactions on Communications 57, No. 9, 2524-2527 (2009).
19
An FPGA technologies area examination of the SHA-3 hash candidate implementations (English)
IACR Cryptology ePrint Archive 2009, 603 (2009).
20
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 65 total