CTRSA
14 years 1 months ago
2004 Springer
Abstract. Secure authentication frequently depends on the correct recognition of a user's public key. When there is no certificate authority, this key is obtained from other u...
CTRSA
14 years 3 months ago
2004 Springer
We describe a block-cipher mode of operation, EME, that turns an n-bit block cipher into
CTRSA
14 years 1 months ago
2004 Springer
We present a cryptanalysis of a zero-knowledge identification protocol introduced by Naccache et al. at Eurocrypt '95. Our cryptanalysis enables a polynomial-time attacker to ...
CTRSA
14 years 3 months ago
2004 Springer
Abstract. A compact mesh architecture for supporting the relation collection step of the number field sieve is described. Differing from TWIRL, only isolated chips without inter-...
CTRSA
14 years 3 months ago
2004 Springer
This paper presents a scalable hardware implementation of both commonly used public key cryptosystems, RSA and Elliptic Curve Cryptosystem (ECC) on the same platform. The introduce...
|