Parallel modular multiplication using 512-bit advanced vector instructions: RSA fault-injection countermeasure via interleaved parallel multiplication
B Buhrow, B Gilbert, C Haider - Journal of Cryptographic Engineering, 2022 - Springer
Applications such as public-key cryptography are critically reliant on the speed of modular
multiplication for their performance. This paper introduces a new block-based variant of …
multiplication for their performance. This paper introduces a new block-based variant of …
Mimosa: Protecting private keys against memory disclosure attacks using hardware transactional memory
Cryptography is essential for computer and network security. When cryptosystems are
deployed in computing or communication systems, it is extremely critical to protect the …
deployed in computing or communication systems, it is extremely critical to protect the …
Parallel implementation of SM2 elliptic curve cryptography on Intel processors with AVX2
This paper presents an efficient and secure implementation of SM2, the Chinese elliptic
curve cryptography standard that has been adopted by the International Organization of …
curve cryptography standard that has been adopted by the International Organization of …
SMCOS: Fast and parallel modular multiplication on ARM NEON architecture for ECC
W Wang, W Wang, J Lin, Y Fu, L Meng… - Information Security and …, 2021 - Springer
Abstract Elliptic Curve Cryptography (ECC) is considered a more effective public-key
cryptographic algorithm in some scenarios, because it uses shorter key sizes while …
cryptographic algorithm in some scenarios, because it uses shorter key sizes while …
Fast and Parallel Modular Multiplication without Borrow for ECC on ARM-NEON
W Wang, W Wang, J Lin, L Shang… - ICC 2023-IEEE …, 2023 - ieeexplore.ieee.org
Fast reduction is a powerful modular reduction method for many ECC curves using NIST-
style prime modulus. Based on fast reduction, existing vectorized modular multiplication …
style prime modulus. Based on fast reduction, existing vectorized modular multiplication …
[PDF][PDF] Mimosa: Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory
MDA using Hardware - ittc.ku.edu
Cryptography is essential for computer and network security. When cryptosystems are
deployed in computing or communication systems, it is extremely critical to protect the …
deployed in computing or communication systems, it is extremely critical to protect the …