High-speed high-security signatures
Autor: | Bernstein, D.J., Duif, N., Lange, T., Schwabe, P., Yang, B.Y., Preneel, B., Takagi, T. |
---|---|
Přispěvatelé: | Discrete Mathematics, Coding Theory and Cryptology |
Jazyk: | angličtina |
Rok vydání: | 2011 |
Předmět: |
High security
Xeon Computer science business.industry Edwards curve Byte 020206 networking & telecommunications 0102 computer and information sciences 02 engineering and technology Computer security computer.software_genre 01 natural sciences Data flow diagram Public-key cryptography Elliptic curve Software 010201 computation theory & mathematics 0202 electrical engineering electronic engineering information engineering business computer |
Zdroj: | Cryptographic Hardware and Embedded Systems-CHES 2011 (13th International Workshop, Nara, Japan, September 28–October 1, 2011. Proceedings), 124-142 STARTPAGE=124;ENDPAGE=142;TITLE=Cryptographic Hardware and Embedded Systems-CHES 2011 (13th International Workshop, Nara, Japan, September 28–October 1, 2011. Proceedings) Cryptographic Hardware and Embedded Systems – CHES 2011 ISBN: 9783642239502 CHES |
ISSN: | 0302-9743 |
Popis: | This paper shows that a $390 mass-market quad-core 2.4GHz Intel Westmere (Xeon E5620) CPU can create 108000 signatures per second and verify 71000 signatures per second on an elliptic curve at a 2128 security level. Public keys are 32 bytes, and signatures are 64 bytes. These performance figures include strong defenses against software side-channel attacks: there is no data flow from secret keys to array indices, and there is no data flow from secret keys to branch conditions. |
Databáze: | OpenAIRE |
Externí odkaz: |