A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m) (English)
Free access
- New search for: Großschädl, Johann
- New search for: Großschädl, Johann
In:
Cryptographic Hardware and Embedded Systems — CHES 2001
7
;
202-219
;
2001
-
ISSN:
- Article/Chapter (Book) / Electronic Resource
-
Title:A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m)
-
Contributors:Großschädl, Johann ( author )
-
Published in:Cryptographic Hardware and Embedded Systems — CHES 2001 , 7 ; 202-219Lecture Notes in Computer Science ; 2162, 7 ; 202-219
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2001-01-01
-
Size:18 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Protecting Embedded Systems— The Next Ten YearsAnderson, Ross et al. | 2001
- 3
-
A Sound Method for Switching between Boolean and Arithmetic MaskingGoubin, Louis et al. | 2001
- 16
-
Fast Primitives for Internal Data Scrambling in Tamper Resistant HardwareBrier, Eric / Handschuh, Helena / Tymen, Christophe et al. | 2001
- 28
-
Random Register Renaming to Foil DPAMay, D. / Muller, H. L. / Smart, N. P. et al. | 2001
- 39
-
Randomized Addition-Subtraction Chains as a Countermeasure against Power AttacksOswald, Elisabeth / Aigner, Manfred et al. | 2001
- 51
-
Architectural Optimization for a 1.82Gbits/sec VLSI Implementation of the AES Rijndael AlgorithmKuo, Henry / Verbauwhede, Ingrid et al. | 2001
- 65
-
High Performance Single-Chip FPGA Rijndael Algorithm ImplementationsMcLoone, Máire / McCanny, J.V et al. | 2001
- 77
-
Two Methods of Rijndael Implementation in Reconfigurable HardwareFischer, Viktor / Drutarovský, Miloš et al. | 2001
- 93
-
Pseudo-random Number Generation on the IBM 4758 Secure Crypto CoprocessorHowgrave-Graham, Nick / Dyer, Joan / Gennaro, Rosario et al. | 2001
- 103
-
Efficient Online Tests for True Random Number GeneratorsSchindler, Werner et al. | 2001
- 118
-
The Hessian Form of an Elliptic CurveSmart, N. P. et al. | 2001
- 126
-
Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic CurveOkeya, Katsuyuki / Sakurai, Kouichi et al. | 2001
- 142
-
Generating Elliptic Curves of Prime OrderSavaş, Erkay / Schmidt, Thomas A. / Koç, Çetin K. et al. | 2001
- 159
-
New Directions in CroptographyShamir, Adi et al. | 2001
- 160
-
A New Low Complexity Parallel Multiplier for a Class of Finite FieldsLeone, Manuel et al. | 2001
- 171
-
Efficient Rijndael Encryption Implementation with Composite Field ArithmeticRudra, Atri / Dubey, Pradeep K. / Jutla, Charanjit S. / Kumar, Vijay / Rao, Josyula R. / Rohatgi, Pankaj et al. | 2001
- 185
-
High-Radix Design of a Scalable Modular MultiplierTenca, Alexandre F. / Todorov, Georgi / Koç, Çetin K. et al. | 2001
- 202
-
A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2m)Großschädl, Johann et al. | 2001
- 220
-
Attacks on Cryptoprocessor Transaction SetsBond, Mike et al. | 2001
- 235
-
Bandwidth-Optimal Kleptographic AttacksYoung, Adam / Yung, Moti et al. | 2001
- 251
-
Electromagnetic Analysis: Concrete ResultsGandolfi, Karine / Mourtel, Christophe / Olivier, Francis et al. | 2001
- 262
-
NTRU in Constrained DevicesBailey, Daniel V. / Coffin, Daniel / Elbirt, Adam / Silverman, Joseph H. / Woodbury, Adam D. et al. | 2001
- 273
-
Transparent Harddisk EncryptionPornin, Thomas et al. | 2001
- 286
-
Sliding Windows Succumbs to Big Mac AttackWalter, C. D. et al. | 2001
- 300
-
Universal Exponentiation Algorithm A First Step towards Provable SPA-ResistanceClavier, Christophe / Joye, Marc et al. | 2001
- 309
-
An Implementation of DES and AES, Secure against Some AttacksAkkar, Mehdi-Laurent / Giraud, Christophe et al. | 2001
- 319
-
Efficient Implementation of “Large” Stream Cipher SystemsSarkar, Palash / Maitra, Subhamoy et al. | 2001
- 333
-
Tradeoffs in Parallel and Serial Implementations of the International Data Encryption Algorithm IDEACheung, O. Y. H. / Tsoi, K. H. / Leong, P. H. W. / Leong, M. P. et al. | 2001
- 348
-
A Scalable GF(p) Elliptic Curve Processor Architecture for Programmable HardwareOrlando, Gerardo / Paar, Christof et al. | 2001
- 364
-
Implementation of RSA Algorithm Based on RNS Montgomery MultiplicationNozaki, Hanae / Motoyama, Masahiko / Shimbo, Atsushi / Kawamura, Shinichi et al. | 2001
- 377
-
Protections against Differential Analysis for Elliptic Curve Cryptography — An Algebraic Approach —Joye, Marc / Tymen, Christophe et al. | 2001
- 391
-
Preventing SPA/DPA in ECC Systems Using the Jacobi FormLiardet, P. -Y. / Smart, N. P. et al. | 2001
- 402
-
Hessian Elliptic Curves and Side-Channel AttacksJoye, Marc / Quisquater, Jean-Jacques et al. | 2001