Index Terms
- Primitive based architectures
Recommendations
On the Security of a Modified Paillier Public-Key Primitive
ACISP '02: Proceedings of the 7th Australian Conference on Information Security and PrivacyChoi et al. proposed the modified Paillier cryptosystem (M-Paillier cryptosystem). They use a special public-key g ZZ/nZZ such that g ( n ) = 1+ n mod n 2, where n is the RSA modulus. The distribution of the public key g is different ...
Fault Detection Architectures for Post-Quantum Cryptographic Stateless Hash-Based Secure Signatures Benchmarked on ASIC
Special Issue on LCETES 2015, Special Issue on ACSD 2015 and Special Issue on Embedded Devise Forensics and SecuritySymmetric-key cryptography can resist the potential post-quantum attacks expected with the not-so-faraway advent of quantum computing power. Hash-based, code-based, lattice-based, and multivariate-quadratic equations are all other potential candidates, ...
Comments