We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Search Results

Showing 1-20 of 758 results
  1. Reference work entry

    Mersenne Prime

    2025
  2. Conference paper

    Effective and Efficient Masking with Low Noise Using Small-Mersenne-Prime Ciphers

    Embedded devices used in security applications are natural targets for physical attacks. Thus, enhancing their side-channel resistance is an...
    Loïc Masure, Pierrick Méaux, ... François-Xavier Standaert in Advances in Cryptology – EUROCRYPT 2023
    2023
  3. Conference paper

    Improved Lattice-Based Attack on Mersenne Low Hamming Ratio Search Problem

    This paper investigates the Mersenne number-based AJPS cryptosystem, with a particular focus on its associated hard problem. Specifically, we aim to...
    Mengce Zheng, Wei Yan in Information Security and Privacy
    2024
  4. Reference work entry

    Prime Number

    2025
  5. Conference paper

    Generalized Feistel Ciphers for Efficient Prime Field Masking

    A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential to improve the efficiency vs. security tradeoff of masked...
    Lorenzo Grassi, Loïc Masure, ... François-Xavier Standaert in Advances in Cryptology – EUROCRYPT 2024
    2024
  6. Conference paper

    Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking

    Symmetric ciphers operating in (small or mid-size) prime fields have been shown to be promising candidates to maintain security against low-noise (or...
    Sebastian Faust, Loïc Masure, ... François-Xavier Standaert in Advances in Cryptology – EUROCRYPT 2024
    2024
  7. Conference paper

    Optimizing Lightweight Intermittent Message Authentication for Programmable Logic Controller

    Programmable Logic Controllers (PLCs) are essential for Cyber-Physical Systems (CPS) but lack a software solution for lightweight message...
    Jiaqi Yang, Jun Xian Chia, ... Zheng Yang in Security and Privacy in Communication Networks
    2025
  8. Conference paper

    Certifying Giant Nonprimes

    GIMPS and PrimeGrid are large-scale distributed projects dedicated to searching giant prime numbers, usually of special forms like Mersenne and Proth...
    Charlotte Hoffmann, Pavel Hubáček, ... Krzysztof Pietrzak in Public-Key Cryptography – PKC 2023
    2023
  9. Article
    Full access

    Windmills of the Minds: A Hopping Algorithm for Fermat’s Two Squares Theorem

    Fermat’s two squares theorem asserts that a prime one more than a multiple of 4 is a sum of two squares. There are many proofs of this gem in number...

    21 October 2024 Open access
  10. Conference paper

    Towards Breaking the Half-Barrier of Local Leakage-Resilient Shamir’s Secret Sharing

    Advanced methods for repairing Reed-Solomon codes, exemplified by the work of Guruswami and Wooters (STOC 2016), can be exploited to launch local...
    2024
  11. Article

    A color image authenticated encryption using conic curve and Mersenne twister

    A robust secure image transmission scheme has to achieve all the security services as confidentiality, authentication, integrity and nonrepudiation...

    Roayat Ismail Abdelfatah in Multimedia Tools and Applications
    25 June 2020
  12. Conference paper

    Post-quantum Provably-Secure Authentication and MAC from Mersenne Primes

    This paper presents a novel, yet efficient secret-key authentication and MAC, which provide post-quantum security promise, whose security is reduced...
    Houda Ferradi, Keita Xagawa in Topics in Cryptology – CT-RSA 2020
    2020
  13. Conference paper

    On Two Applications of Polynomials \(x^k-cx-d\) over Finite Fields and More

    For integers \(k \in [2,q-2]\) coprime to...
    Canberk İrimağzı, Ferruh Özbudak in Arithmetic of Finite Fields
    2023
  14. Article

    E\({^2}\)CSM: efficient FPGA implementation of elliptic curve scalar multiplication over generic prime field GF(p)

    Elliptic curve scalar multiplication (ECSM) is the primitive operation that is also the main computational hurdle in almost all protocols based on...

    Khalid Javeed, Ali El-Moursy, David Gregg in The Journal of Supercomputing
    22 June 2023
  15. Article

    Montgomery-friendly primes and applications to cryptography

    This paper deals with Montgomery-friendly primes designed for the modular reduction algorithm of Montgomery. These numbers are scattered in the...

    Jean Claude Bajard, Sylvain Duquesne in Journal of Cryptographic Engineering
    05 April 2021
  16. Article
    Full access

    An algebraic approach to symmetric linear layers in cryptographic primitives

    Subterranean 2.0 is a permutation-based cipher suite which works with a 257 bit-state. It is designed for lightweight cryptography, and it scores...

    Robert Christian Subroto in Cryptography and Communications
    14 February 2023 Open access
Did you find what you were looking for? Share feedback.