搜索结果: 16-30 共查到“军事学 ECC”相关记录41条 . 查询时间(0.048 秒)
Faster ECC over F_{2^571} (feat. PMULL)
Polynomial Multiplication Binary Field Multiplication ARMv8
2015/12/24
In this paper, we show efficient implementations of K-571
over ARMv8. We exploit an advanced 64-bit polynomial multiplication
(PMULL) supported by ARMv8 for high speed multiplication and squaring
o...
An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices
Attribute-based encryption ciphertext-policy constant-size secret key
2015/12/23
The energy cost of asymmetric cryptography is a vital component of modern secure communications, which
inhibits its wide spread adoption within the ultra-low energy regimes such as Implantable Medica...
Using Modular Extension to Provably Protect ECC Against Fault Attacks
fault injection attack countermeasure
2015/12/23
Fault injection attacks are a real-world threat to cryptosystems,
in particular asymmetric cryptography. In this paper, we focus on
countermeasures which guarantee the integrity of the computation r...
Dismantling real-world ECC with Horizontal and Vertical Template Attacks
Side-channel analysis horizontal leakage vertical leakage
2015/12/22
Recent side-channel attacks on elliptic curve algorithms have shown that the security of these cryptosystems is a matter of serious concern. The development of techniques in the area of Template Attac...
ECC-Based Non-Interactive Deniable Authentication with Designated Verifier
Designated Verifier Non-Interactive
2014/3/5
Recently, researchers have proposed many non-interactive deniable authentication (NIDA) protocols. Most of them claim that their protocols possess full deniability. However, after reviewing, we found ...
In this work, elliptic curve cryptography (ECC) is used to make an efficient implementation of a public-key cryptography algorithm on the ARM Cortex-M0+. The goal of this implementation is to make not...
Attack on Liao and Hsiao's Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol
private authentication attack
2014/3/12
We show that the Liao and Hsiao's protocol achieves neither tag-authentication nor privacy.
Practical realisation and elimination of an ECC-related software bug attack
elliptic curve OpenSSL NIST fault attack bug attack
2012/6/14
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the entire (static) pri...
Practical realisation and elimination of an ECC-related software bug attack
cryptographic protocols / elliptic curve OpenSSL NIST fault attack bug attack
2012/3/22
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the entire (static) pri...
Practical realisation and elimination of an ECC-related software bug attack
cryptographic protocols / elliptic curve OpenSSL NIST fault attack bug attack
2012/3/21
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the entire (static) pri...
An efficient RFID mutual authentication scheme based on ECC
applications / RFID location privacy forward secrecy mutual authentication
2012/3/27
Recently, Radio Frequency Identification (RFID) technique has been widely deployed in many applications, such as medical drugs management in hospitals and missing children searching in amusement parks...
Weakness in an ECC-based AKA Protocol for Wireless Mobile Communications
Authenticated key agreement Off-line password guessing attack
2011/7/25
With the rapid progress of wireless mobile communication, the authenticated key agreement protocol has attracted an increasing amount of attention.
Proxy Blind Multi-signature Scheme using ECC for handheld devices
cryptographic protocols / ECDLP blind signature multi-signature proxy signature
2012/3/29
A proxy blind signature scheme is a special form of blind signature which allowed a designated person called proxy signer to sign on behalf of two or more original signers without knowing the content ...
Fast Scalar Multiplication in ECC using The Multi base Number System
applications / elliptic curve cryptosystem
2012/3/29
As a generalization of double base chains, multibase number system is very suitable for efficient computation of scalar multiplication of a point of elliptic curve because of shorter representation le...
Fast Scalar Multiplication in ECC using The Multi base Number System
scalar multiplication elliptic curve double base number system multibase number system double chain septupling
2011/2/23
As a generalization of double base chains, multibase number system is very suitable for efficient computation of scalar multiplication of a point of elliptic curve because of shorter representation le...