The Community for Technology Leaders
Green Image
Issue No. 11 - November (vol. 57)
ISSN: 0018-9340

Guest Editors' Introduction to the Special Section on Special-Purpose Hardware for Cryptography and Cryptanalysis (PDF)

Rainer Steinwandt , Department of Mathematical Sciences, Florida Atlantic University, Boca Raton, FL
Willi Geiselmann , Institut fur Algorithmen und Kognitive Systeme, Universitat Karlsruhe, Karlsruhe, Germany
Çetin Kaya Koç , City University of Istanbul and the Department of Computer Science and the College of Creative Studies, University of California Santa Barbara, Santa Barbara, CA
pp. 1441-1442
SPECIAL SECTION on Special-Purpose Hardware for Cryptography and Cryptanalysis

High-Performance Architecture of Elliptic Curve Scalar Multiplication (Abstract)

Bijan Ansari , University of Waterloo, Waterloo
M. Anwar Hasan , University of Waterloo, Waterloo
pp. 1443-1453

Algorithms and Arithmetic Operators for Computing the ηT Pairing in Characteristic Three (Abstract)

Jean-Luc Beuchat , University of Tsukuba, Tsukuba
Nicolas Brisebarre , ENS Lyon, Lyon
Jérémie Detrey , B-it, Bonn
Eiji Okamoto , University of Tsukuba, Tsukuba
Masaaki Shirase , Future University, Hakodate
Tsuyoshi Takagi , Future University, Hakodate
pp. 1454-1468

Provably Sublinear Point Multiplication on Koblitz Curves and Its Hardware Implementation (Abstract)

Vassil S. Dimitrov , University of Calgary, Calgary
Kimmo U. Järvinen , Helsinki University of Technology , Espoo
Micheal J. Jacobson Jr. , University of Calgary, Calgary
Wai Fong (Andy) Chan , University of Calgary, Calgary
Zhun Huang , University of Calgary, Calgary
pp. 1469-1481

Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks (Abstract)

Sylvain Guilley , GET/ENST, PARIS
Laurent Sauvage , GET/ENST, PARIS
Philippe Hoogvorst , GET/ENST, PARIS
Renaud Pacalet , GET/ENST, Sophia Antipolis
Guido Marco Bertoni , STMicroelectronics, AGRATE
Sumanta Chaudhuri , Institut TELECOM, TELECOM ParisTech CNRS LTCI
pp. 1482-1497

Cryptanalysis with COPACOBANA (Abstract)

Tim Güneysu , Ruhr-Universität Bochum, Bochum
Timo Kasper , Ruhr-Universität Bochum, Bochum
Martin Novotný , Ruhr-Universität Bochum, Bochum
Christof Paar , Ruhr-Universität Bochum, Bochum
Andy Rupp , Ruhr-Universität Bochum, Bochum
pp. 1498-1513

Elliptic-Curve-Based Security Processor for RFID (Abstract)

Yong Ki Lee , University of California, Los Angeles
Kazuo Sakiyama , University of Electro-Communications, Tokyo
Lejla Batina , K.U.Leuven, Leuven-Heverlee
Ingrid Verbauwhede , University of California, Los Angeles and K.U.Leuven
pp. 1514-1527

Double-Data-Rate Computation as a Countermeasure against Fault Analysis (Abstract)

Paolo Maistri , TIMA Laboratory, Grenoble
Régis Leveugle , TIMA Laboratory, Grenoble
pp. 1528-1539

Protection Circuit against Differential Power Analysis Attacks for Smart Cards (Abstract)

Radu Muresan , University of Guelph, Guelph
Stefano Gregori , University of Guelph, Guelph
pp. 1540-1549
Regular Papers

Novel Table Lookup-Based Algorithms for High-Performance CRC Generation (Abstract)

Michael E. Kounavis , Intel Corporation, Hillsboro
Frank L. Berry , Intel Corporation, Hillsboro
pp. 1550-1560

Efficient Approximate Wordlength Optimization (Abstract)

Paul D. Fiore , MIT Lincoln Laboratory, Lexington
pp. 1561-1570

Configurable Flash-Memory Management: Performance versus Overheads (Abstract)

Jen-Wei Hsieh , National Taiwan University, Taipei
Yi-Lin Tsai , National Taiwan University, Taipei
Tei-Wei Kuo , National Taiwan University, Taipei
Tzao-Lin Lee , National Taiwan University, Taipei
pp. 1571-1583
83 ms
(Ver 3.3 (11022016))