Results 221 to 230 of about 3,565 (253)
Some of the next articles are maybe not open access.
Microprocessor architecture for private-key cryptography
Irish Signals and Systems Conference 2004, 2004A novel generic instructions set for a RISC microprocessor designed to accelerate the performance of all private-key cryptographic algorithms is described in this paper. The RISC microprocessor has coprocessors and instruction extensions designed to specifically implement and accelerate the Rijndael and DES private key algorithms.
openaire +1 more source
Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop (AICT/SAPIR/ELETE'05), 2005
This paper documents the development of a generic interface between the Altera Nios-II FPGA based soft-processor and a private key encryption core implementation. An existing AES encryption core was used for evaluation purposes. It was found that there was an overhead, relative to the time taken for the test encryption core, of between 40.0% and 72.7 ...
P. Moore, M. McLoone, S. Sezer
openaire +1 more source
This paper documents the development of a generic interface between the Altera Nios-II FPGA based soft-processor and a private key encryption core implementation. An existing AES encryption core was used for evaluation purposes. It was found that there was an overhead, relative to the time taken for the test encryption core, of between 40.0% and 72.7 ...
P. Moore, M. McLoone, S. Sezer
openaire +1 more source
Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise
2007A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC.
openaire +1 more source
Private-Key Error Correcting Cryptography Based on QC-LDPC Codes for Telemetry System
2014Aiming at the security and reliability of data transmission in a wireless telemetry system, a new error correcting cryptography algorithm is proposed in this paper. The novel algorithm employs quasi-cyclic low-density parity-check (QC-LDPC) codes for simultaneous encryption and channel encoding, which is different from the traditional concatenated ...
Jinrong Zhang +3 more
openaire +1 more source
Post Quantum Implications on Private and Public Key Cryptography
2023 International Conference on Smart Systems for applications in Electrical Sciences (ICSSES), 2023Seema B. Hegde +2 more
openaire +1 more source
Strategies for delivering therapeutics across the blood–brain barrier
Nature Reviews Drug Discovery, 2021Georg C Terstappen, Wandong Zhang
exaly
Digital Signature and Private Key Cryptography Mechanisms for Enhancing Node Authentication in WSN
2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS), 2023K Suriyakrishnaan +3 more
openaire +1 more source
Security in quantum cryptography
Reviews of Modern Physics, 2022Christopher Portmann, Renato Renner
exaly
Private key updating scheme of identity-based public key cryptography under distributed network
Journal of Computer Applications, 2009Wei LI, Chang-yuan LUO, Xiao CHU
openaire +1 more source
Entanglement-based secure quantum cryptography over 1,120 kilometres
Nature, 2020Juan Yin, Yu-Huai Li, Sheng-Kai Liao
exaly

