• Aucun résultat trouvé

[PDF] Top 20 RNS Modular Computations for Cryptographic Applications

Has 10000 "RNS Modular Computations for Cryptographic Applications" found on our website. Below are the top 20 most common "RNS Modular Computations for Cryptographic Applications".

RNS Modular Computations for Cryptographic Applications

RNS Modular Computations for Cryptographic Applications

... I splits operands into 2 parts: − → X = −−→ ( K x ) × −−−→ (M a ) + −−→ ( R x ) allows to replace 2n moduli by only 3 2 n I reuses split result in various computation patterns I requires an hypothesis on P: OK for ... Voir le document complet

2

Multi-fault Attack Detection for RNS Cryptographic Architecture

Multi-fault Attack Detection for RNS Cryptographic Architecture

... critical applications, ...[13]. For this purpose, prior works showed that RNS naturally provides a Leak Resistant Arithmetic ...Again, RNS owns a natural detection solution through the use of ... Voir le document complet

9

Methods and tools for the optimization of modular electrical power distribution cabinets in aeronautical applications

Methods and tools for the optimization of modular electrical power distribution cabinets in aeronautical applications

... of computations resources and time making them unacceptable for an optimization ...just for magnetic components: indeed, these components have currently fully developed numerical simulation ... Voir le document complet

195

Improving Modular Inversion in RNS using the Plus-Minus Method

Improving Modular Inversion in RNS using the Plus-Minus Method

... of modular inversion algorithms have been imple- mented on ...of cryptographic RNS processors for ECC applications in the future, we use an architecture similar to the state-of-art one ... Voir le document complet

18

Single Base Modular Multiplication for Efficient Hardware RNS Implementations of ECC

Single Base Modular Multiplication for Efficient Hardware RNS Implementations of ECC

... new RNS modular multiplication algorithm which only requires a single base bit width instead of a double ...selected for very efficient computations in ...an RNS modular ... Voir le document complet

19

Binary-Ternary Plus-Minus Modular Inversion in RNS

Binary-Ternary Plus-Minus Modular Inversion in RNS

... VII. C ONCLUSION A new fast RNS modular inversion algorithm has been proposed. This algorithm is based on the binary extended Eu- clidean algorithm, as the state-of-the-art one proposed in [10]. In the new ... Voir le document complet

9

Arithmetic operators on GF(2m) for cryptographic applications: performance - power consumption - security tradeoffs

Arithmetic operators on GF(2m) for cryptographic applications: performance - power consumption - security tradeoffs

... algorithm for multiplication in binary finite field extensions is one of the aims of this thesis, thus the thorough analysis of existing methods and solutions is ...aimed for ECC applications thus they ... Voir le document complet

141

Resilience of randomized RNS arithmetic with respect to side-channel leaks of cryptographic computation

Resilience of randomized RNS arithmetic with respect to side-channel leaks of cryptographic computation

... the computations use different representations from one execution to ...on RNS representation based on the Chinese Remainder ...randomized RNS arithmetic offers a good opportunity to randomize ... Voir le document complet

12

Trade-off Approaches for Leak Resistant Modular Arithmetic in RNS

Trade-off Approaches for Leak Resistant Modular Arithmetic in RNS

... of cryptographic operation, like an RSA modular exponentiation [12], can be attacked by side channel ...implements modular arithmetic in residue number sys- tem (RNS) and randomizes the ... Voir le document complet

19

RNS Modular Multiplication through Reduced Base Extensions

RNS Modular Multiplication through Reduced Base Extensions

... in cryptographic applications. In this paper, we propose a new RNS modular multiplication algorithm over F P with a reduced number of moduli in base ...operations for large ... Voir le document complet

7

Statistical Properties of Short RSA Distribution and Their Cryptographic Applications

Statistical Properties of Short RSA Distribution and Their Cryptographic Applications

... and for N 1/e  M  √ N , we will use more recent results proved by Wooley ...since for M ≤ N 1/e , it is possible in polynomial-time to recover x ≤ M given the k ≥ M least significant bits of f (x) as we ... Voir le document complet

19

Modular and Hierarchical Discrete Control for Applications and Middleware Deployment in IoT and Smart Buildings

Modular and Hierarchical Discrete Control for Applications and Middleware Deployment in IoT and Smart Buildings

... at applications level (functionalities) as well as deployment level (software tasks, exe- cution ...Control for Discrete Event Systems (DES), where the space of configura- tions at the different levels are ... Voir le document complet

9

OTAWA, a Framework for Experimenting WCET Computations

OTAWA, a Framework for Experimenting WCET Computations

... OTAWA. For example, the concept of l-block, a partition of basic blocks according cache blocks bounds, is used in each instruction cache ...is for the cache modelling data structures that are used by the ... Voir le document complet

9

A framework for Symbolic and Numeric Computations

A framework for Symbolic and Numeric Computations

... 101 - 54602 Villers lès Nancy Cedex France Unité de recherche INRIA Rennes : IRISA, Campus universitaire de Beaulieu - 35042 Rennes Cedex France Unité de recherche INRIA Rhône-Alpes : 65[r] ... Voir le document complet

100

ROS/RNS modulation in Systemic sclerosis treatment

ROS/RNS modulation in Systemic sclerosis treatment

... 47 Figure 8. Animal models of inducible and spontaneous SSc by Batteux, Current Opinion in Rheumatology, 2011. In these mice, except for fibrosis, they are other clinical abnormalities like vasculitis, alopecia ... Voir le document complet

223

Evaluation of Power-Constant Dual-Rail Logic as a Protection of Cryptographic Applications in FPGAs

Evaluation of Power-Constant Dual-Rail Logic as a Protection of Cryptographic Applications in FPGAs

... Fig. 3. Board used to acquire side-channel information on the Stratix FPGA. Fig. 4. Customization of the commercial board shown in Fig. 3 for better power measurement. and Correlation Power Attack (CPA), as ... Voir le document complet

10

A generalisation of Miller's algorithm and applications to pairing computations on abelian varieties

A generalisation of Miller's algorithm and applications to pairing computations on abelian varieties

... law, for other models it may require some computations to obtain it (see for instance ...relations for theta functions, we generalize Miller’s algorithm to all abelian ... Voir le document complet

33

Modular C

Modular C

... Many approaches have been proposed over the years to improve the composability of C projects, but seemingly few of them have resulted in tangible improvements for programming in C on the language level. In ... Voir le document complet

52

Modular optimization strategy for layout problems

Modular optimization strategy for layout problems

... search for the optimal design. For solving the design problem, the designer almost always has to correct either the mathematical model, the dimension of the vectors of design variables and criteria, the ... Voir le document complet

12

Advances in Cryptographic Voting Systems

Advances in Cryptographic Voting Systems

... 1.3.1 Chain-of-Custody Security Current voting solutions use some type of voting machine to assist voters in preparing and casting a ballot. The machines are built by private companies, according to various state- ... Voir le document complet

255

Show all 10000 documents...