Summation Polynomial Algorithms for Elliptic Curves in Characteristic Two (English)
- New search for: Galbraith, S.D.
- New search for: Gebregiyorgis, S.W.
- New search for: Galbraith, S.D.
- New search for: Gebregiyorgis, S.W.
- New search for: Meier, Willi
- New search for: Mukhopadhyay, Debdeep
In:
Cryptology in India; Progress in cryptology -- INDOCRYPT 2014
8885
;
409-427
;
2014
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Summation Polynomial Algorithms for Elliptic Curves in Characteristic Two
-
Contributors:
-
Conference:International conference; 15th, Cryptology in India; Progress in cryptology -- INDOCRYPT 2014 ; 2014 ; New Delhi
-
Published in:Cryptology in India; Progress in cryptology -- INDOCRYPT 2014 , 8885 ; 409-427LECTURE NOTES IN COMPUTER SCIENCE , 8885 ; 409-427
-
Publisher:
- New search for: Springer
-
Place of publication:Cham
-
Publication date:2014-01-01
-
Size:19 pages
-
Remarks:Includes bibliographical references and index. Also issued online.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Side-Channel Analysis on Blinded Regular Scalar MultiplicationsFeix, B. / Roussellet, M. / Venelli, A. et al. | 2014
- 21
-
Online Template AttacksBatina, L. / Chmielewski, L. / Papachristodoulou, L. / Schwabe, P. / Tunstall, M. et al. | 2014
- 37
-
Improved Multi-bit Differential Fault Analysis of TriviumDey, P. / Adhikari, A. et al. | 2014
- 53
-
Recovering CRT-RSA Secret Keys from Message Reduced Values with Side-Channel AnalysisFeix, B. / Thiebeauld, H. / Tordella, L. et al. | 2014
- 71
-
On Constant-Round Concurrent Zero-Knowledge from a Knowledge AssumptionGupta, D. / Sahai, A. et al. | 2014
- 89
-
Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom FunctionsChandran, N. / Garg, S. et al. | 2014
- 107
-
Linear Cryptanalysis of the PP-1 and PP-2 Block CiphersColburn, M. / Keliher, L. et al. | 2014
- 124
-
On the Key Schedule of Lightweight Block CiphersHuang, J. / Vaudenay, S. / Lai, X. et al. | 2014
- 143
-
Cryptanalysis of Reduced-Round SIMON32 and SIMON48Wang, Q. / Liu, Z. / Varici, K. / Sasaki, Y. / Rijmen, V. / Todo, Y. et al. | 2014
- 161
-
General Application of FFT in Cryptanalysis and Improved Attack on CAST-256Wen, L. / Wang, M. / Bogdanov, A. / Chen, H. et al. | 2014
- 179
-
Cryptanalysis of the Double-Feedback XOR-Chain Scheme Proposed in Indocrypt 2013Banik, S. / Chattopadhyay, A. / Chowdhury, A. et al. | 2014
- 197
-
EscApe: Diagonal Fault Analysis of APESaha, D. / Kuila, S. / Chowdhury, D.R. et al. | 2014
- 219
-
Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-FunctionsPolak, I. / Shamir, A. et al. | 2014
- 237
-
Linear Cryptanalysis of FASER128/256 and TriviA-ckXu, C. / Zhang, B. / Feng, D. et al. | 2014
- 255
-
Partial Key Exposure Attack on CRT-RSASarkar, S. / Venkateswarlu, A. et al. | 2014
- 265
-
On the Leakage of Information in Biometric AuthenticationPagnin, E. / Dimitrakakis, C. / Abidin, A. / Mitrokotsa, A. et al. | 2014
- 283
-
One Word/Cycle HC-128 Accelerator via State-Splitting OptimizationKhalid, A. / Ravi, P. / Chattopadhyay, A. / Paul, G. et al. | 2014
- 304
-
A Very Compact FPGA Implementation of LED and PHOTONAnandakumar, N.N. / Peyrin, T. / Poschmann, A. et al. | 2014
- 322
-
S-box Pipelining Using Genetic Algorithms for High-Throughput AES Implementations: How Fast Can We Go?Batina, L. / Jakobovic, D. / Mentens, N. / Picek, S. / de la Piedra, A. / Sisejkovic, D. et al. | 2014
- 341
-
Wire-Tap Codes as Side-Channel Countermeasure: - An FPGA-Based Experiment -Moradi, A. et al. | 2014
- 360
-
Differential Power Analysis in Hamming Weight Model: How to Choose among (Extended) Affine Equivalent S-boxesSarkar, S. / Maitra, S. / Chakraborty, K. et al. | 2014
- 374
-
Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxesPicek, S. / Papagiannopoulos, K. / Ege, B. / Batina, L. / Jakobovic, D. et al. | 2014
- 393
-
Binary Edwards Curves RevisitedKim, K.H. / Lee, C.O. / Negre, C. et al. | 2014
- 409
-
Summation Polynomial Algorithms for Elliptic Curves in Characteristic TwoGalbraith, S.D. / Gebregiyorgis, S.W. et al. | 2014
- 428
-
A Quantum Algorithm for Computing Isogenies between Supersingular Elliptic CurvesBiasse, J.-F. / Jao, D. / Sankar, A. et al. | 2014