Parallel modular multiplication using 512-bit advanced vector instructions: RSA fault-injection countermeasure via interleaved parallel multiplication

B Buhrow, B Gilbert, C Haider - Journal of Cryptographic Engineering, 2022 - Springer
Applications such as public-key cryptography are critically reliant on the speed of modular
multiplication for their performance. This paper introduces a new block-based variant of …

Mimosa: Protecting private keys against memory disclosure attacks using hardware transactional memory

C Li, L Guan, J Lin, B Luo, Q Cai… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Cryptography is essential for computer and network security. When cryptosystems are
deployed in computing or communication systems, it is extremely critical to protect the …

Parallel implementation of SM2 elliptic curve cryptography on Intel processors with AVX2

J Huang, Z Liu, Z Hu, J Großschädl - Information Security and Privacy: 25th …, 2020 - Springer
This paper presents an efficient and secure implementation of SM2, the Chinese elliptic
curve cryptography standard that has been adopted by the International Organization of …

SMCOS: Fast and parallel modular multiplication on ARM NEON architecture for ECC

W Wang, W Wang, J Lin, Y Fu, L Meng… - Information Security and …, 2021 - Springer
Abstract Elliptic Curve Cryptography (ECC) is considered a more effective public-key
cryptographic algorithm in some scenarios, because it uses shorter key sizes while …

Fast and Parallel Modular Multiplication without Borrow for ECC on ARM-NEON

W Wang, W Wang, J Lin, L Shang… - ICC 2023-IEEE …, 2023 - ieeexplore.ieee.org
Fast reduction is a powerful modular reduction method for many ECC curves using NIST-
style prime modulus. Based on fast reduction, existing vectorized modular multiplication …

[PDF][PDF] Mimosa: Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory

MDA using Hardware - ittc.ku.edu
Cryptography is essential for computer and network security. When cryptosystems are
deployed in computing or communication systems, it is extremely critical to protect the …