Results 81 to 90 of about 20,688 (169)

Stopping time signatures for some algorithms in cryptography [PDF]

open access: yes, 2019
We consider the normalized distribution of the overall running times of some cryptographic algorithms, and what information they reveal about the algorithms.
Deift, Percy   +2 more
core   +1 more source

Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing

open access: yesIEEE Access
Cloud computing is a fast-growing industry that offers various online services, including software, computing resources, and databases. Its payment model is usage-based, whereas consistency is based on resource-sharing.
K. Sasikumar, Sivakumar Nagarajan
doaj   +1 more source

Use of Elliptic Curves in Cryptography [PDF]

open access: yes, 2007
We discuss the use of elliptic curves in cryptography. In particular, we propose an analogue of the Diffie-Hellmann key exchange protocol which appears to be immune from attacks of the style of Western, Miller, and Adleman. With the current bounds for infeasible attack, it appears to be about 20% faster than the Diffie-Hellmann scheme over GF(p).
openaire   +1 more source

Distortion maps for genus two curves [PDF]

open access: yes, 2005
Distortion maps are a useful tool for pairing based cryptography. Compared with elliptic curves, the case of hyperelliptic curves of genus g > 1 is more complicated since the full torsion subgroup has rank 2g.
Galbraith, Steven D.   +3 more
core   +3 more sources

Efficient unified Montgomery inversion with multibit shifting [PDF]

open access: yes, 2004
Computation of multiplicative inverses in finite fields GF(p) and GF(2/sup n/) is the most time-consuming operation in elliptic curve cryptography, especially when affine co-ordinates are used.
Gutub, Adnan Abdül-Aziz   +3 more
core  

Home - About - Disclaimer - Privacy