Sciweavers

1769 search results - page 61 / 354
» Cryptography
Sort
View
97
Voted
PATMOS
2007
Springer
15 years 8 months ago
Low Power Elliptic Curve Cryptography
Maurice Keller, William P. Marnane
129
Voted
FOCS
2006
IEEE
15 years 8 months ago
Cryptography from Anonymity
There is a vast body of work on implementing anonymous communication. In this paper, we study the possibility of using anonymous communication as a building block, and show that o...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
137
Voted
ITNG
2006
IEEE
15 years 8 months ago
Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptogr
Worldwide symmetric encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard), and EES (Escrowed Encryption Standard), have been – and some...
Dragos Trinca
77
Voted
ACRI
2006
Springer
15 years 8 months ago
Generation of Expander Graphs Using Cellular Automata and Its Applications to Cryptography
Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury
133
Voted
SBCCI
2006
ACM
124views VLSI» more  SBCCI 2006»
15 years 8 months ago
A cryptography core tolerant to DFA fault attacks
This work describes a hardware approach for the concurrent fault detection and error correction in a cryptographic core. It has been shown in the literature that transient faults ...
Carlos Roberto Moratelli, Érika F. Cota, Ma...