Sciweavers

324 search results - page 38 / 65
» Guessing based on length functions
Sort
View
DATE
2003
IEEE
87views Hardware» more  DATE 2003»
14 years 26 days ago
FPGA-Based Implementation of a Serial RSA Processor
In this paper we present an hardware implementation of the RSA algorithm for public-key cryptography. The RSA algorithm consists in the computation of modular exponentials on larg...
Antonino Mazzeo, Luigi Romano, Giacinto Paolo Sagg...
CRYPTO
2001
Springer
117views Cryptology» more  CRYPTO 2001»
14 years 2 days ago
Online Ciphers and the Hash-CBC Construction
We initiate a study of on-line ciphers. These are ciphers that can take input plaintexts of large and varying lengths and will output the ith block of the ciphertext after having p...
Mihir Bellare, Alexandra Boldyreva, Lars R. Knudse...
ASYNC
1998
IEEE
91views Hardware» more  ASYNC 1998»
13 years 12 months ago
Predicting Performance of Micropipelines Using Charlie Diagrams
A technique is presented to predict the performance behavior of control circuits for a linear FIFO. The control circuit consists of a linear chain of RendezVous elements, also cal...
Jo C. Ebergen, Scott Fairbanks, Ivan E. Sutherland
RTA
2010
Springer
13 years 11 months ago
Closing the Gap Between Runtime Complexity and Polytime Computability
In earlier work, we have shown that for confluent term rewrite systems (TRSs for short), innermost polynomial runtime complexity induces polytime computability of the functions de...
Martin Avanzini, Georg Moser
EUROCRYPT
2000
Springer
13 years 11 months ago
Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme
We exhibit an attack against a signature scheme recently proposed by Gennaro, Halevi and Rabin [9]. The scheme's security is based on two assumptions namely the strong RSA ass...
Jean-Sébastien Coron, David Naccache