Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Daniel Shumow is active.

Publication


Featured researches published by Daniel Shumow.


international symposium on computer architecture | 2012

Inspection resistant memory: architectural support for security from physical examination

Jonathan Valamehr; Melissa Chase; Seny Kamara; Andrew Putnam; Daniel Shumow; Vinod Vaikuntanathan; Timothy Sherwood

The ability to safely keep a secret in memory is central to the vast majority of security schemes, but storing and erasing these secrets is a difficult problem in the face of an attacker who can obtain unrestricted physical access to the underlying hardware. Depending on the memory technology, the very act of storing a 1 instead of a 0 can have physical side effects measurable even after the power has been cut. These effects cannot be hidden easily, and if the secret stored on chip is of sufficient value, an attacker may go to extraordinary means to learn even a few bits of that information. Solving this problem requires a new class of architectures that measurably increase the difficulty of physical analysis. In this paper we take a first step towards this goal by focusing on one of the backbones of any hardware system: on-chip memory. We examine the relationship between security, area, and efficiency in these architectures, and quantitatively examine the resulting systems through cryptographic analysis and microarchitectural impact. In the end, we are able to find an efficient scheme in which, even if an adversary is able to inspect the value of a stored bit with a probabilistic error of only 5%, our system will be able to prevent that adversary from learning any information about the original un-coded bits with 99.9999999999% probability.


selected areas in cryptography | 2013

Montgomery Multiplication Using Vector Instructions

Joppe W. Bos; Peter L. Montgomery; Daniel Shumow; Gregory M. Zaverucha

In this paper we present a parallel approach to compute interleaved Montgomery multiplication. This approach is particularly suitable to be computed on 2-way single instruction, multiple data platforms as can be found on most modern computer architectures in the form of vector instruction set extensions. We have implemented this approach for tablet devices which run the x86 architecture Intel Atom Z2760 using SSE2 instructions as well as devices which run on the ARM platform Qualcomm MSM8960, NVIDIA Tegra 3 and 4 using NEON instructions. When instantiating modular exponentiation with this parallel version of Montgomery multiplication we observed a performance increase of more than a factor of 1.5 compared to the sequential implementation in OpenSSL for the classical arithmetic logic unit on the Atom platform for 2048-bit moduli.


international conference on pairing based cryptography | 2012

Affine pairings on ARM

Tolga Acar; Kristin E. Lauter; Michael Naehrig; Daniel Shumow

We report on relative performance numbers for affine and projective pairings on a dual-core Cortex A9 ARM processor. Using a fast inversion in the base field and doing inversion in extension fields by using the norm map to reduce to inversions in smaller fields, we find a very low ratio of inversion-to-multiplication costs. In our implementation, this favors using affine coordinates, even for the current 128-bit minimum security level specified by NIST. We use Barreto-Naehrig (BN) curves and report on the performance of an optimal ate pairing for curves covering security levels between 128 and 192 bits. We compare with other reported performance numbers for pairing computation on ARM CPUs.


Mathematics of Computation | 2016

Analogues of Vélu’s formulas for isogenies on alternate models of elliptic curves

Dustin Moody; Daniel Shumow

Isogenies of elliptic curves have been well-studied, in part because there are several cryptographic applications. Using Velu’s formula, isogenies can be evaluated explicitly given their kernel. However, Velu’s formula applies to elliptic curves given by a Weierstrass equation. In this paper we show how to similarly evaluate isogenies on Edwards curves and Huff curves. Edwards and Huff curves are new normal forms for elliptic curves, different than the traditional Weierstrass form.


Archive | 2007

WEIGHTED ENTROPY POOL SERVICE

Tolga Acar; Daniel Shumow; Andrew Stewart Tucker; Carl M. Ellison


Archive | 2010

SIDE CHANNEL ATTACK ANALYSIS

Daniel Shumow; Peter L. Montgomery


Archive | 2010

Modular Reduction without Pre-computation for Special Moduli

Tolga Acar; Daniel Shumow


Archive | 2010

Side Channel Leakage Profiling in Software

Daniel Shumow; Peter L. Montgomery


IACR Cryptology ePrint Archive | 2009

Isogenies of Elliptic Curves: A Computational Approach

Daniel Shumow


Archive | 2014

Cryptographically Verified Design and Implementation of a Distributed Key Manager

Tolga Acar; Cédric Fournet; Daniel Shumow

Collaboration


Dive into the Daniel Shumow's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dustin Moody

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Vinod Vaikuntanathan

Massachusetts Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge