搜索结果: 1-15 共查到“Hardware implementation”相关记录20条 . 查询时间(0.093 秒)
CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme
Authenticated Cipher COLM CPA
2019/8/22
Authenticated encryption schemes provide both confidentiality and integrity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, like all physical impl...
A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES
NTRU lattice-based hardware
2019/4/1
In this paper, we present a high-speed constant time hardware implementation of NTRUEncrypt Short Vector Encryption Scheme (SVES), fully compliant with the IEEE 1363.1 Standard Specification for Publi...
On Hardware Implementation of Tang-Maitra Boolean Functions
Boolean Functions Bent Functions Cryptology
2018/7/16
In this paper, we investigate the hardware circuit complexity of the class of Boolean functions recently introduced by Tang and Maitra (IEEE-TIT 64(1): 393 402, 2018). While this class of functions ha...
White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels
White-Box Side-Channel CPA
2016/2/26
Implementations of white-box cryptography aim to protect a secret key in a white-box environment in which an adversary has full control over the execution process and the entire environment. Its funda...
Area-Time Efficient Hardware Implementation of Elliptic Curve Cryptosystem
Elliptic Curves Cryptosystems(ECC) RSA ASIC
2016/1/27
The strength of ECC lies in the hardness of elliptic curve
discrete logarithm problem (ECDLP) and the hight level security with
significantly smaller keys. Thus, using smaller key sizes is a gain in...
Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs
Department of Electrical and Computer Engineering, Northeastern University
2016/1/6
Keccak is the hash function selected by NIST as the new SHA-3 standard. Keccak
is built on Sponge construction and it provides a new MAC function called MAC-Keccak. These
new algorithms have raised ...
Hardware Implementation of Secure Shamir's Secret Sharing Scheme
implementation Secret sharing
2016/1/6
Shamir’s secret sharing scheme is an effective way to distribute secret to a group of
shareholders. But this scheme is vulnerable to cheaters and attackers and thus how to protect
the system from ch...
Area-Efficient Hardware Implementation of the Optimal Ate Pairing over BN curves
BN curves Optimal Ate Pairing Final Exponentiation
2015/12/21
To have an efficient asymmetric key encryption scheme, such as elliptic
curves, hyperelliptic curves, pairing ... etc we have to go through
arithmetic optimization then hardware optimization. Regard...
Hardware Implementation of Queue Length Based Pacing on NetFPGA
small-buffers optical networks pacing netfpga
2014/12/8
Optical packet switching networks are the foundation for next generation high speed Internet and are fast becoming the norm rather than an option. When such high speed optical networks are taken into ...
Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs
PMI+ Encryption and Decryption Hardware Implementation
2014/3/5
PMI+ is a Multivariate Quadratic (MQ) public key algorithm used for encryption and decryption operations, and belongs to post quantum cryptography.We designs a hardware on FPGAs to efficiently impleme...
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs
Garbled Circuit Hardware Implementation Leakage-Resilience One-Time Programs Secure Function Evaluation
2010/7/13
The power of side-channel leakage attacks on cryptographic implementations is evident. Today's practical defenses are typically attack-specific countermeasures against certain classes of side-channel ...
Differential power analysis resistant hardware implementation of the RSA cryptosystem
RSA montgomery modular multiplier carry save adder side-channel attacks differential power analysis attack
2010/10/12
In this paper, RSA cryptosystem was implemented on hardware, then modified to be resistant against Differential Power Analysis attacks by using the Randomized Table Window method. This is the first FP...
Differential power analysis resistant hardware implementation of the RSA cryptosystem
RSA montgomery modular multiplier carry save adder side-channel attacks differential power analysis attack randomized table window method
2010/3/17
In this paper, RSA cryptosystem was implemented on hardware, then modified to be resistant against Differential Power Analysis attacks by using the Randomized Table Window method. This is the first FP...
Skein is a submission to the NIST SHA-3 hash function com-
petition which has been optimized towards implementation in modern
64-bit processor architectures. This paper investigates the performance
...
On the Hardware Implementation of the MICKEY-128 Stream Cipher
Hardware Implementation MICKEY-128 Stream Cipher
2009/3/3
Encryption algorithms are becoming more necessary to
ensure the securely transmitted data over insecure
communication channels. MICKEY-128 is a recently
developed stream cipher with two major advan...