We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Modular Arithmetic

    This chapter Modular arithmeticintroduces modular arithmetic and its notation. It also shows how modular arithmetic is used in practice with worked...
    Chapter 2023
  2. Symbolic Transformation of Expressions in Modular Arithmetic

    We present symbolic methods to improve the precision of static analyses of modular integer expressions based on Abstract Interpretation. Like similar...
    Jérôme Boillot, Jérôme Feret in Static Analysis
    Conference paper 2023
  3. Polynomial Analysis of Modular Arithmetic

    The modular polynomial abstract domain, MPAD, is proposed, whose invariants are systems of polynomial equations that hold modulo a power of 2. Its...
    Thomas Seed, Chris Coppins, ... Neil Evans in Static Analysis
    Conference paper 2023
  4. A new multimedia cryptosystem using chaos, quaternion theory and modular arithmetic

    Based on the combination of quaternion numbers, residual matrices, and chaotic attractors, a new cryptosystem is proposed for multimedia processing...

    Mendez Luis, Ladino Daniel, ... Alvarado Deicy in Multimedia Tools and Applications
    Article Open access 09 March 2023
  5. Rinocchio: SNARKs for Ring Arithmetic

    Succinct non-interactive arguments of knowledge (SNARKs) enable non-interactive efficient verification of NP computations and admit short proofs....

    Chaya Ganesh, Anca Nitulescu, Eduardo Soria-Vazquez in Journal of Cryptology
    Article 13 October 2023
  6. Efficient Arithmetic in Garbled Circuits

    Garbled Circuit (GC) techniques usually work with Boolean circuits. Despite intense interest, efficient arithmetic generalizations of GC were only...
    Conference paper 2024
  7. Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic

    Mariya Georgieva Belorgey, Sergiu Carpov, ... Mohsen Mohammadi in Journal of Cryptology
    Article 11 July 2023
  8. Montgomery curve arithmetic revisited

    A one-third century ago, as a means to speed up the elliptic curve method (ECM) for integer factoring, Montgomery suggested using a special elliptic...

    Kwang Ho Kim, Sihem Mesnager, Kyong Il Pak in Journal of Cryptographic Engineering
    Article 13 May 2024
  9. Big Number and Polynomial Arithmetic

    This chapter deals with two related topics that belong to the general area of “computer algebra”: the computation with integer numbers of arbitrary...
    Wolfgang Schreiner in Concrete Abstractions
    Chapter 2023
  10. Divisibility, Congruences, and Modular Arithmetic

    Modern cryptography is largely based on the mathematicals of modular arithmetic, congruences, and the arithmetic in the integers modulo prime numbers...
    Chapter 2021
  11. New Ways to Garble Arithmetic Circuits

    The beautiful work of Applebaum, Ishai, and Kushilevitz [FOCS’11] initiated the study of arithmetic variants of Yao’s garbled circuits. An arithmetic...
    Marshall Ball, Hanjun Li, ... Tianren Liu in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  12. Hammering Floating-Point Arithmetic

    Sledgehammer, a component of the interactive proof assistant Isabelle/HOL, aims to increase proof automation by automatically discharging proof goals...
    Olle Torstensson, Tjark Weber in Frontiers of Combining Systems
    Conference paper Open access 2023
  13. Parameterized Algorithms for Covering by Arithmetic Progressions

    An arithmetic progression is a sequence of integers in which the difference between any two consecutive elements is the same. We investigate the...
    Ivan Bliznets, Jesper Nederlof, Krisztina Szilágyi in SOFSEM 2024: Theory and Practice of Computer Science
    Conference paper 2024
  14. Energy efficient triple-modular exponential techniques for batch verification schemes

    Most of the authentication protocols have modular multi-exponentiation (MME) as their core operation in the verification step. Triple modular-multi...

    Satyanarayana Vollala in Journal of Cryptographic Engineering
    Article 16 March 2024
  15. Modular Arithmetic

    This chapter introduces modular arithmeticModular arithmetic and its notation. It also shows how modular arithmetic is used in practice with worked...
    Chapter 2020
  16. Modular Polynomial Multiplication Using RSA/ECC Coprocessor

    Modular polynomial multiplication is a core and costly operation of ideal lattice-based schemes. In the context of embedded devices, previous works...
    Aurélien Greuet, Simon Montoya, Clémence Vermeersch in Network and System Security
    Conference paper 2023
  17. Finite Field Arithmetic in Large Characteristic for Classical and Post-quantum Cryptography

    Both classical and post-quantum cryptography massively use large characteristic finite fields or rings. Consequently, basic arithmetic on these...
    Sylvain Duquesne in Arithmetic of Finite Fields
    Conference paper 2023
  18. On the Usefulness of Linear Modular Arithmetic in Constraint Programming

    Linear modular constraints are a powerful class of constraints that arise naturally in cryptanalysis, checksums, hash functions, and the like. Given...
    Gilles Pesant, Kuldeep S. Meel, Mahshid Mohammadalitajrishi in Integration of Constraint Programming, Artificial Intelligence, and Operations Research
    Conference paper 2021
  19. How to Garble Mixed Circuits that Combine Boolean and Arithmetic Computations

    The study of garbling arithmetic circuits is initiated by Applebaum, Ishai, and Kushilevitz [FOCS’11], which can be naturally extended to mixed...
    Hanjun Li, Tianren Liu in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  20. Formal Verification of Arithmetic Masking in Hardware and Software

    Masking is a popular countermeasure to protect cryptographic implementations against physical attacks like differential power analysis. So far,...
    Barbara Gigerl, Robert Primas, Stefan Mangard in Applied Cryptography and Network Security
    Conference paper 2023
Did you find what you were looking for? Share feedback.