The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 11 - November (vol. 57)
ISSN: 0018-9340
SPECIAL SECTION on Special-Purpose Hardware for Cryptography and Cryptanalysis

High-Performance Architecture of Elliptic Curve Scalar Multiplication (Abstract)

M. Anwar Hasan , University of Waterloo, Waterloo
Bijan Ansari , University of Waterloo, Waterloo
pp. 1443-1453

Algorithms and Arithmetic Operators for Computing the ηT Pairing in Characteristic Three (Abstract)

Nicolas Brisebarre , ENS Lyon, Lyon
Eiji Okamoto , University of Tsukuba, Tsukuba
Masaaki Shirase , Future University, Hakodate
Jérémie Detrey , B-it, Bonn
Jean-Luc Beuchat , University of Tsukuba, Tsukuba
Tsuyoshi Takagi , Future University, Hakodate
pp. 1454-1468

Provably Sublinear Point Multiplication on Koblitz Curves and Its Hardware Implementation (Abstract)

Wai Fong (Andy) Chan , University of Calgary, Calgary
Zhun Huang , University of Calgary, Calgary
Kimmo U. Järvinen , Helsinki University of Technology , Espoo
Vassil S. Dimitrov , University of Calgary, Calgary
Micheal J. Jacobson Jr. , University of Calgary, Calgary
pp. 1469-1481

Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks (Abstract)

Laurent Sauvage , GET/ENST, PARIS
Guido Marco Bertoni , STMicroelectronics, AGRATE B.za
Sylvain Guilley , GET/ENST, PARIS
Sumanta Chaudhuri , Institut TELECOM, TELECOM ParisTech CNRS LTCI
Philippe Hoogvorst , GET/ENST, PARIS
Renaud Pacalet , GET/ENST, Sophia Antipolis
pp. 1482-1497

Cryptanalysis with COPACOBANA (Abstract)

Martin Novotný , Ruhr-Universität Bochum, Bochum
Tim Güneysu , Ruhr-Universität Bochum, Bochum
Andy Rupp , Ruhr-Universität Bochum, Bochum
Christof Paar , Ruhr-Universität Bochum, Bochum
Timo Kasper , Ruhr-Universität Bochum, Bochum
pp. 1498-1513

Elliptic-Curve-Based Security Processor for RFID (Abstract)

Lejla Batina , K.U.Leuven, Leuven-Heverlee
Yong Ki Lee , University of California, Los Angeles
Kazuo Sakiyama , University of Electro-Communications, Tokyo
Ingrid Verbauwhede , University of California, Los Angeles and K.U.Leuven
pp. 1514-1527

Double-Data-Rate Computation as a Countermeasure against Fault Analysis (Abstract)

Paolo Maistri , TIMA Laboratory, Grenoble
Régis Leveugle , TIMA Laboratory, Grenoble
pp. 1528-1539

Protection Circuit against Differential Power Analysis Attacks for Smart Cards (Abstract)

Stefano Gregori , University of Guelph, Guelph
Radu Muresan , University of Guelph, Guelph
pp. 1540-1549
Regular Papers

Novel Table Lookup-Based Algorithms for High-Performance CRC Generation (Abstract)

Frank L. Berry , Intel Corporation, Hillsboro
Michael E. Kounavis , Intel Corporation, Hillsboro
pp. 1550-1560

Efficient Approximate Wordlength Optimization (Abstract)

Paul D. Fiore , MIT Lincoln Laboratory, Lexington
pp. 1561-1570

Configurable Flash-Memory Management: Performance versus Overheads (Abstract)

Tei-Wei Kuo , National Taiwan University, Taipei
Yi-Lin Tsai , National Taiwan University, Taipei
Jen-Wei Hsieh , National Taiwan University, Taipei
Tzao-Lin Lee , National Taiwan University, Taipei
pp. 1571-1583
97 ms
(Ver 3.1 (10032016))