On the implementation of the Advanced Encryption Standard on a public-key crypto-coprocessor

被引:0
|
作者
Garcia, AV
Seifert, JP
机构
关键词
AES; crypto-coprocessor; implementation issues; secure implementation;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper describes how to implement the new Advanced Encryption Standard (AES) using a modular arithmetic crypto-coprocessor, typically used to speed up public-key crypto-systems. This idea provides a fast and secure AES implementation when a dedicated hardware AES module is not available. The advantages of using the modular arithmetic co-processor when compared to a pure software implementation are: much higher execution performance, less memory usage, and optimized protection against side-channel attacks.
引用
收藏
页码:135 / 145
页数:11
相关论文
共 50 条
  • [21] Incremental Deterministic Public-Key Encryption
    Mironov, Ilya
    Pandey, Omkant
    Reingold, Omer
    Segev, Gil
    JOURNAL OF CRYPTOLOGY, 2018, 31 (01) : 134 - 161
  • [22] TFHE Public-Key Encryption Revisited
    Joye, Marc
    TOPICS IN CRYPTOLOGY, CT-RSA 2024, 2024, 14643 : 277 - 291
  • [23] On the security of hybrid public-key encryption
    Nagao, W
    Manabe, Y
    Okamoto, T
    ISAS/CITSA 2004: International Conference on Cybernetics and Information Technologies, Systems and Applications and 10th International Conference on Information Systems Analysis and Synthesis, Vol 1, Proceedings: COMMUNICATIONS, INFORMATION TECHNOLOGIES AND COMPUTING, 2004, : 28 - 33
  • [24] Public-Key Encryption with Lazy Parties
    Yasunaga, Kenji
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (02) : 590 - 600
  • [25] Dynamic threshold public-key encryption
    Delerablee, Cecile
    Pointcheval, David
    ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 317 - 334
  • [26] Incremental Deterministic Public-Key Encryption
    Ilya Mironov
    Omkant Pandey
    Omer Reingold
    Gil Segev
    Journal of Cryptology, 2018, 31 : 134 - 161
  • [27] Integer Reconstruction Public-Key Encryption
    Ferradi, Houda
    Naccache, David
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 412 - 433
  • [28] Parallel authentication and public-key encryption
    Pieprzyk, J
    Pointcheval, D
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 387 - 401
  • [29] Incremental Deterministic Public-Key Encryption
    Mironov, Ilya
    Pandey, Omkant
    Reingold, Omer
    Segev, Gil
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 628 - 644
  • [30] Universally anonymizable public-key encryption
    Hayashi, R
    Tanaka, K
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 293 - 312