Results 151 to 160 of about 219,404 (221)

Low latency FPGA implementation of twisted Edward curve cryptography hardware accelerator over prime field. [PDF]

open access: yesSci Rep
Hossain MR   +7 more
europepmc   +1 more source

Accelerating private-key cryptography via multithreading on symmetric multiprocessors [PDF]

open access: closed2003 IEEE International Symposium on Performance Analysis of Systems and Software. ISPASS 2003., 2003
Achieving high performance in cryptographic processing is important due to the increasing connectivity among today's computers. Despite steady improvements in microprocessor and system performance, private-key cipher implementations continue to be slow.
P. Dongara, T. N. Vijaykumar
semanticscholar   +3 more sources

Public and Private Key Cryptography

open access: closedMastering Excel Through Projects, 2021
Please download the sample Excel files from https://github.com/hhohho/master-Excel-through-projects for this chapter’s exercises.
Hong Zhou
semanticscholar   +4 more sources

Post Quantum Public and Private Key Cryptography Optimized for IoT Security

open access: closedWireless Personal Communications, 2022
The number of Internet of Things devices is growing exponentially with the introduction of 5G. They are incorporated into a wide spectrum of devices ranging from our mobile phones to healthcare tracking devices. With the advent of 5G and quantum computers, traditional cryptography algorithms will be deprecated and will be prone to quantum attacks by ...
Ajay Kaushik   +8 more
semanticscholar   +4 more sources

Microprocessor architecture for private-key cryptography

open access: closedIrish Signals and Systems Conference 2004, 2004
A novel generic instructions set for a RISC microprocessor designed to accelerate the performance of all private-key cryptographic algorithms is described in this paper. The RISC microprocessor has coprocessors and instruction extensions designed to specifically implement and accelerate the Rijndael and DES private key algorithms.
Neil Smyth
semanticscholar   +4 more sources

Post Quantum Implications on Private and Public Key Cryptography

open access: closed2023 International Conference on Smart Systems for applications in Electrical Sciences (ICSSES), 2023
With the increase in the computing resources power the quantum computers are penetrating into the communication networks. Therefore, assured security of classical cryptographic algorithms is highly questionable and needs inspection.
Seema B. Hegde   +2 more
semanticscholar   +3 more sources

Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

open access: closed, 2007
A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC.
Cheman Shaik
semanticscholar   +4 more sources

Private key and public key quantum cryptography

open access: closedSummaries of Papers Presented at the Quantum Electronics and Laser Science Conference, 2003
Summary form only given. Information has always been valuable, never more so than in recent decades, and throughout history people have turned to cryptography in an attempt to keep important information secret. Coherent manipulation of quantum states promises to rearrange the lists of possible and impossible cryptographic tasks.
Daniel Gottesman
openalex   +3 more sources

Home - About - Disclaimer - Privacy