Learn More
High speed DSP blocks present in the modern FPGAs can be used to implement prime field multiplication to accelerate Elliptic Curve scalar multiplication in prime fields. However, compared to logic slices, DSP blocks are scarce resources, hence its usage needs to be optimized. The asymmetric 25 × 18 signed multipliers in FPGAs open a new paradigm for(More)
Messerges, Dabbish and Sloan proposed a DPA attack which analyzes the address values of registers [1]. This attack is called the Address-bit DPA (ADPA) attack. As countermeasures against ADPA, Itoh, Izu and Takenaka proposed algorithms that randomizes address bits [2]. In this paper, we point out that one of their countermeasures has vulnerability even if(More)
Recent years, the information security is emphasized with a development of Internet systems. In the measures as securing digital information, there are cryptosystems that protect secrecy of digital documents and digital signature scheme that ensure validity of digital documents. In the case of reality, i.e. hardware devices are used in cryptosystems, there(More)
In 2008, Izu et al. introduced a concept of the sanitizable and deletable signature as a combination of the sanitizable signature and the deletable signature in which the partial information (e.g. privacy information) can be sanitized or deleted with keeping the integrity of disclosed parts. They also constructed two concrete sanitizable and deletable(More)
  • 1