Results 241 to 250 of about 61,999 (289)

Accelerating private-key cryptography via multithreading on symmetric multiprocessors

open access: closed2003 IEEE International Symposium on Performance Analysis of Systems and Software. ISPASS 2003., 2003
Achieving high performance in cryptographic processing is important due to the increasing connectivity among today's computers. Despite steady improvements in microprocessor and system performance, private-key cipher implementations continue to be slow.
P. Dongara, T. N. Vijaykumar
openalex   +2 more sources

Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

open access: closed, 2007
A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC.
Cheman Shaik
openalex   +2 more sources

Microprocessor architecture for private-key cryptography

open access: closedIrish Signals and Systems Conference 2004, 2004
A novel generic instructions set for a RISC microprocessor designed to accelerate the performance of all private-key cryptographic algorithms is described in this paper. The RISC microprocessor has coprocessors and instruction extensions designed to specifically implement and accelerate the Rijndael and DES private key algorithms.
Neil Smyth
openalex   +2 more sources

Private key and public key quantum cryptography

open access: closedSummaries of Papers Presented at the Quantum Electronics and Laser Science Conference, 2003
Summary form only given. Information has always been valuable, never more so than in recent decades, and throughout history people have turned to cryptography in an attempt to keep important information secret. Coherent manipulation of quantum states promises to rearrange the lists of possible and impossible cryptographic tasks.
Daniel Gottesman
openalex   +2 more sources

Distributed Private-Key Generators for Identity-Based Cryptography

open access: closed, 2010
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG), which can create private keys for clients, and so can passively eavesdrop on all encrypted communications.
Aniket Kate, Ian Goldberg
openalex   +2 more sources

Reconfigurable instruction interface architecture for private-key cryptography on the Altera Nios-II processor

open access: closedAdvanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop (AICT/SAPIR/ELETE'05), 2005
This paper documents the development of a generic interface between the Altera Nios-II FPGA based soft-processor and a private key encryption core implementation. An existing AES encryption core was used for evaluation purposes. It was found that there was an overhead, relative to the time taken for the test encryption core, of between 40.0% and 72.7 ...
P. A. Moore, M. McLoone, Sakir Sezer
openalex   +2 more sources

Authenticated key agreement protocol for virtual private network based on certificateless cryptography

open access: closed2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE), 2013
Virtual Private Networks have been efficient tools that provide inter-connectivity to exchange information between different (remote) parties that belong to a specific network. A virtual private network possesses all the features of the private networks and are built upon existing network, but they suffer severe security problems, particularly, the ...
Abeer Eldewahi, Eihab Basheir
openalex   +2 more sources

Private-Key Error Correcting Cryptography Based on QC-LDPC Codes for Telemetry System

open access: closed, 2014
Aiming at the security and reliability of data transmission in a wireless telemetry system, a new error correcting cryptography algorithm is proposed in this paper. The novel algorithm employs quasi-cyclic low-density parity-check (QC-LDPC) codes for simultaneous encryption and channel encoding, which is different from the traditional concatenated ...
Jinrong Zhang   +3 more
openalex   +2 more sources

An introduction to classic Cryptography, with an exposition of the mathematics for private and public key ciphers,

open access: closed, 2018
Cryptography concerns the principles, protocols, and methods for protecting information against deliberate alteration. For millennia, cryptography was mainly used in diplomacy and military affairs, but cryptographic techniques have recently also been introduced into the bureaucratic, managerial, and economic sides of civil life, and they have been ...
Michele Elia
openalex   +2 more sources

Post Quantum Implications on Private and Public Key Cryptography

open access: closed2023 International Conference on Smart Systems for applications in Electrical Sciences (ICSSES), 2023
Seema B. Hegde   +2 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy