Sciweavers

317 search results - page 54 / 64
» Certificateless Public Key Cryptography
Sort
View
AES
2004
Springer
142views Cryptology» more  AES 2004»
14 years 3 months ago
Complementation-Like and Cyclic Properties of AES Round Functions
Abstract. While it is known previously that the cycle lengths of individual components of the AES round function are very small, we demonstrate here that the cycle length of the S-...
Tri Van Le, Rüdiger Sparr, Ralph Wernsdorf, Y...
IPPS
2003
IEEE
14 years 3 months ago
Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array
This paper describes a hardware architecture for modular multiplication operation which is efficient for bit-lengths suitable for both commonly used types of Public Key Cryptogra...
Siddika Berna Örs, Lejla Batina, Bart Preneel...
PKC
1999
Springer
142views Cryptology» more  PKC 1999»
14 years 2 months ago
Encrypted Message Authentication by Firewalls
Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant information encapsulated into proto...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
14 years 1 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
STACS
2010
Springer
14 years 4 months ago
Mathematics, Cryptology, Security
Abstract. In this talk, I will review some of the work performed by the research community in cryptology and security since the invention of public key cryptography by Diffie and H...
Jacques Stern