Obscuring cryptographic computations may be accomplished by performing modular exponentiation of an exponent in a cryptographic computation such that memory accesses are independent of the exponent bit pattern, thereby deterring timing attacks.
Web www.patentalert.com
< Apparatus using a time division multiple access bus for providing multiple levels of security in a communications system
< Method and system for a recursive security protocol for digital copyright control
> Squared Weil and Tate pairing techniques for use with elliptic curves
> Local authentication of mobile subscribers outside their home systems
HOME | NEW USER | LOGIN | SUBSCRIPTIONS | SEARCH | GUESTBOOK | CONTACT