搜索结果: 1-15 共查到“军事学 addition”相关记录35条 . 查询时间(0.14 秒)
Some Properties of Modular Addition
modular addition partitions differential cryptanalysis
2018/11/20
In this paper we study a problem which emerged during an attempt to apply a differential cryptanalysis method to the <> algorithm. We obtained a general formula of distribution in the differenc...
Constructing Multidimensional Differential Addition Chains and their Applications
differential addition chains side channel resistance elliptic curves
2017/4/12
We propose new algorithms for constructing multidimensional differential addition chains and for performing multidimensional scalar point multiplication based on these chains. Our algorithms work in a...
Parallelized Side-Channel Attack Resisted Scalar Multiplication Using q-Based Addition-Subtraction k-chains
Parallel Algorithms Elliptic Curve Cryptography Scalar Multiplication
2016/12/9
This paper presents parallel scalar multiplication techniques for elliptic curve cryptography using q-based addition-subtraction k-chain which can also effectively resist side-channel attack. Many tec...
On Fast Calculation of Addition Chains for Isogeny-Based Cryptography
Addition chains post-quantum cryptography isogeny-based cryptosystems
2016/12/7
Addition chain calculations play a critical role in determining the efficiency of cryptosystems based on isogenies on elliptic curves. However, finding a minimal length addition chain is not easy; a g...
Cryptographic Properties of Addition Modulo $2^n$
Modular addition Boolean function Component Boolean function
2016/2/24
The operation of modular addition modulo a power of
two is one of the most applied operations in symmetric cryptography.
For example, modular addition is used in RC6, MARS and
Twofish block ciphers...
Algebraic Properties of Modular Addition Modulo a Power of Two
applicable operators symmetric cryptography
2016/1/25
Modular addition modulo a power of two, is one of the
most applicable operators in symmetric cryptography; therefore,
investigating cryptographic properties of this operator has a
significant role ...
A More Explicit Formula for Linear Probabilities of Modular Addition Modulo a Power of Two
Modular addition modulo a power of two Linear probability Symmetric cipher
2016/1/5
Linear approximations of modular addition modulo a power of two was studied by Wallen in 2003. He presented an efficient algorithm for computing linear probabilities of modular addition. In 2013 Scult...
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware
side-channel analysis threshold implementation Boolean masking
2016/1/4
A common countermeasure to thwart side-channel analysis
attacks is algorithmic masking. For this, algorithms that mix Boolean
and arithmetic operations need to either apply two different masking
sc...
Complete addition formulas for prime order elliptic curves
public-key cryptography elliptic curves short Weierstrass form
2015/12/21
An elliptic curve addition law is said to be complete if it correctly computes the
sum of any two points in the elliptic curve group. One of the main reasons for the increased
popularity of Edwards ...
Efficient computation of addition-subtraction chains using generalized continued Fractions
addition-subtraction chains non-adjacent form
2014/3/11
The aim of this paper is to present a new way of computing short addition-subtraction chains using the generalized continued fractions where subtraction is allowed. We will recover the most used ways ...
On a generalized combinatorial conjecture involving addition $\mod 2^k - 1$
foundations / combinatorics addition boolean functions
2012/3/27
In this note, we give a simple proof of the combinatorial conjecture proposed by Tang, Carlet and Tang, based on which they constructed two classes of Boolean functions with many good cryptographic pr...
A generalization of the Lucas addition chains
public-key cryptography addition chain addition-subtraction chain
2011/7/25
In this paper, we give a generalization of Lucas addition chains, where subtraction is allowed. We call them ''Lucas addition-subtraction chain''.
A generalization of the Lucas addition chains
public-key cryptography / addition chain addition-subtraction chain Lucas chains
2012/3/27
In this paper, we give a generalization of Lucas addition chains, where subtraction is allowed. We call them ''Lucas addition-subtraction chain''. We also show that this new method gives minimal addit...
On the Number of Carries Occuring in an Addition $\mod 2^k-1$
foundations / boolean functions
2012/3/28
In this paper we study the number of carries occurring while performing an addition modulo $2^k-1$. For a fixed modular integer $t$, it is natural to expect the number of carries occurring when adding...
On the Number of Carries Occuring in an Addition $\mod 2^k-1$
foundations boolean functions
2011/6/9
In this paper we study the number of carries occurring while performing an addition modulo $2^k-1$. For a fixed modular integer $t$, it is natural to expect the number of carries occurring when adding...