![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Side-Channeling the Kalyna Key Expansion
In 2015, the block cipher Kalyna has been approved as the new encryption standard of Ukraine. The cipher is a substitution-permutation network, whose design is based on AES, but includes several different feat...
-
Chapter and Conference Paper
RSA Key Recovery from Digit Equivalence Information
The seminal work of Heninger and Shacham (Crypto 2009) demonstrated a method for reconstructing secret RSA keys from partial information of the key components. In this paper we further investigate this approa...
-
Chapter and Conference Paper
Towards Practical GGM-Based PRF from (Module-)Learning-with-Rounding
We investigate the efficiency of a \(\mathsf {(module}\text {-}\mathsf {)LWR}\)-based PRF built using the GGM design. Our construction enjoys the security proof of the GGM construction and the $$\mathsf {(module}...
-
Chapter and Conference Paper
NTRU Prime: Reducing Attack Surface at Low Cost
Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit special structures of the rings used in those cryptosystems. The same structures are also used in the leading proposals...
-
Chapter and Conference Paper
Pairing-Friendly Twisted Hessian Curves
This paper presents efficient formulas to compute Miller doubling and Miller addition utilizing degree-3 twists on curves with j-invariant 0 written in Hessian form. We give the formulas for both odd and even emb...
-
Chapter and Conference Paper
Twisted Hessian Curves
This paper presents new speed records for arithmetic on a large family of elliptic curves with cofactor 3: specifically, $$8.77\mathbf...
-
Chapter and Conference Paper
How to Manipulate Curve Standards: A White Paper for the Black Hat http://bada55.cr.yp.to
This paper analyzes the cost of breaking ECC under the following assumptions: (1) ECC is using a standardized elliptic curve that was actually chosen by an attacker; (2) the attacker is aware of a vulnerabilit...
-
Chapter and Conference Paper
Kummer Strikes Back: New DH Speed Records
This paper sets new speed records for high-security constant-time variable-base-point Diffie–Hellman software: 305395 Cortex-A8-slow cycles; 273349 Cortex-A8-fast cycles; 88916 Sandy Bridge cycles; 88448 Ivy B...
-
Chapter and Conference Paper
PandA: Pairings and Arithmetic
This paper introduces PandA, a software framework for Pairings and Arithmetic. It is designed to bring together advances in the efficient computation of cryptographic pairings and the development and implementati...
-
Chapter and Conference Paper
Curve41417: Karatsuba Revisited
This paper introduces constant-time ARM Cortex-A8 ECDH software that (1) is faster than the fastest ECDH option in the latest version of OpenSSL but (2) achieves a security level above 2200 using a prime above 24...