All Stories

  1. Computing pth roots in extended finite fields of prime characteristic p ≥ 2
  2. Note on Modular Reduction in Extended Finite Fields and Polynomial Rings for Simple Hardware
  3. Side channel attack on multiprecision multiplier used in protected ECDSA implementation
  4. Correlation Power Analysis using Measured and Simulated Power Traces based on Hamming Distance Power Model – Attacking 16-bit Integer Multiplier in FPGA
  5. McEliece PKC Calculator
  6. Improving CPA Attack Against DSA and ECDSA
  7. Overview of the Mceliece Cryptosystem and its Security
  8. Cryptography Based on Error Correcting Codes