Zobrazeno 1 - 10
of 41
pro vyhledávání: '"Christophe, Doche"'
Autor:
Mohamad Ali Mehrabi, Christophe Doche
Publikováno v:
Information, Vol 10, Iss 9, p 285 (2019)
Twisted Edwards curves have been at the center of attention since their introduction by Bernstein et al. in 2007. The curve ED25519, used for Edwards-curve Digital Signature Algorithm (EdDSA), provides faster digital signatures than existing schemes
Externí odkaz:
https://doaj.org/article/e4bbe33dc8d8478596f54d2aeecb438f
Publikováno v:
IEEE Transactions on Computers. 69:1707-1718
In today's technology, a sheer number of Internet of Things applications use hardware security modules for secure communications. The widely used algorithms in security modules, for example, digital signatures and key agreement, are based upon ellipt
Publikováno v:
IET Information Security. 13:278-284
In this study, the authors propose a new protocol to share secret shadows for verifiable ( t , n ) secret sharing (VSS) schemes. Unlike traditional VSS schemes, whose communications between the dealer and the participants require a secure channel, th
Autor:
Christophe Doche, Mohamad Ali Mehrabi
Publikováno v:
Information, Vol 10, Iss 9, p 285 (2019)
Information
Volume 10
Issue 9
Information
Volume 10
Issue 9
Twisted Edwards curves have been at the center of attention since their introduction by Bernstein et al. in 2007. The curve ED25519, used for Edwards-curve Digital Signature Algorithm (EdDSA), provides faster digital signatures than existing schemes
Publikováno v:
International Journal of Security and Its Applications. 8:225-234
RFID is an important technology that can be used to create the ubiquitous society. But an RFID system uses open radio frequency signal to transfer information and this leads to pose many serious threats to its privacy and security. In general, the co
Autor:
Christophe Doche, Daniel Sutantyo
Publikováno v:
IEEE Transactions on Computers. 63:230-242
We address several algorithms to perform a double-scalar multiplication on an elliptic curve. All the methods investigated are related to the double-base number system (DBNS) and extend previous work of Doche et al. [25]. We refine and rigorously pro
Autor:
Christophe Doche
Publikováno v:
Mathematics of Computation. 74:1923-1936
We know from Littlewood (1968) that the moments of order 4 of the classical Rudin-Shapiro polynomials P n (z) satisfy a linear recurrence of degree 2. In a previous article, we developed a new approach, which enables us to compute exactly all the mom
Publikováno v:
Annales de biologie clinique. 72(2)
The aim of the study is to specify the pre-analytical conditions required for Down's syndrome screening in first trimester by maternal serum markers. The concentration variation of both markers, hCGβ and PAPP-A, was analyzed at room temperature, at
Autor:
Christophe Doche
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783662456071
ASIACRYPT (1)
Advances in Cryptology – ASIACRYPT 2014
Advances in Cryptology – ASIACRYPT 2014, 8874, Springer Berlin Heidelberg, pp.297-316, 2014, Lecture Notes in Computer Science, ⟨10.1007/978-3-662-45611-8_16⟩
ASIACRYPT (1)
Advances in Cryptology – ASIACRYPT 2014
Advances in Cryptology – ASIACRYPT 2014, 8874, Springer Berlin Heidelberg, pp.297-316, 2014, Lecture Notes in Computer Science, ⟨10.1007/978-3-662-45611-8_16⟩
The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any integer n. A Double-Base Chain (DBC) is a special case of a DBNS expansion. DBCs have been introduced to speed up the scalar multiplication [n]P on certain famili
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::635c731e5fe9036576566bd7381437c7
https://doi.org/10.1007/978-3-662-45611-8_16
https://doi.org/10.1007/978-3-662-45611-8_16
Autor:
Christophe Doche, Daniel Sutantyo
Publikováno v:
Selected Areas in Cryptography--SAC 2013 ISBN: 9783662434130
Selected Areas in Cryptography
Selected Areas in Cryptography
The use of precomputed data to speed up a cryptographic protocol is commonplace. For instance, the owner of a public point $$P$$ on an elliptic curve can precompute various points of the form $$[2^k]P$$ and transmit them together with $$P$$ . One inc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::325785932787dc8d92fda34fe19d6fbd
https://doi.org/10.1007/978-3-662-43414-7_23
https://doi.org/10.1007/978-3-662-43414-7_23