Results 241 to 250 of about 63,410 (288)

Authenticated key agreement protocol for virtual private network based on certificateless cryptography

open access: closed2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE), 2013
Virtual Private Networks have been efficient tools that provide inter-connectivity to exchange information between different (remote) parties that belong to a specific network. A virtual private network possesses all the features of the private networks and are built upon existing network, but they suffer severe security problems, particularly, the ...
Abeer Eldewahi, Eihab Basheir
openaire   +2 more sources

Accelerating private-key cryptography via multithreading on symmetric multiprocessors

open access: closed2003 IEEE International Symposium on Performance Analysis of Systems and Software. ISPASS 2003., 2003
Achieving high performance in cryptographic processing is important due to the increasing connectivity among today's computers. Despite steady improvements in microprocessor and system performance, private-key cipher implementations continue to be slow.
P. Dongara, T.N. Vijaykumar
openaire   +2 more sources

Reconfigurable instruction interface architecture for private-key cryptography on the Altera Nios-II processor

open access: closedAdvanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop (AICT/SAPIR/ELETE'05), 2005
This paper documents the development of a generic interface between the Altera Nios-II FPGA based soft-processor and a private key encryption core implementation. An existing AES encryption core was used for evaluation purposes. It was found that there was an overhead, relative to the time taken for the test encryption core, of between 40.0% and 72.7 ...
P. Moore, M. McLoone, S. Sezer
openaire   +2 more sources

Distributed Private-Key Generators for Identity-Based Cryptography

open access: closed, 2010
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG), which can create private keys for clients, and so can passively eavesdrop on all encrypted communications.
Aniket Kate, Ian Goldberg
openaire   +2 more sources

Private-Key Error Correcting Cryptography Based on QC-LDPC Codes for Telemetry System

open access: closed, 2014
Aiming at the security and reliability of data transmission in a wireless telemetry system, a new error correcting cryptography algorithm is proposed in this paper. The novel algorithm employs quasi-cyclic low-density parity-check (QC-LDPC) codes for simultaneous encryption and channel encoding, which is different from the traditional concatenated ...
Jinrong Zhang   +3 more
openaire   +2 more sources

Post Quantum Implications on Private and Public Key Cryptography

open access: closed2023 International Conference on Smart Systems for applications in Electrical Sciences (ICSSES), 2023
Seema B. Hegde   +2 more
openaire   +2 more sources

An introduction to classic Cryptography, with an exposition of the mathematics for private and public key ciphers,

open access: closed, 2018
Cryptography concerns the principles, protocols, and methods for protecting information against deliberate alteration. For millennia, cryptography was mainly used in diplomacy and military affairs, but cryptographic techniques have recently also been introduced into the bureaucratic, managerial, and economic sides of civil life, and they have been ...
Michele Elia
openaire   +2 more sources

Home - About - Disclaimer - Privacy