Sciweavers

164 search results - page 23 / 33
» Implementation of the GBD Cryptosystem
Sort
View
IJNSEC
2010
146views more  IJNSEC 2010»
13 years 4 months ago
A Novel Digital Envelope Approach for A Secure E-Commerce Channel
Data privacy and integrity will be the crucial and significant factors in recent times for trade which will be transacted over the Internet through e-commerce and mcommerce channe...
Ramachandran Ganesan, Mohan Gobi, Kanniappan Vivek...
CISC
2005
Springer
107views Cryptology» more  CISC 2005»
13 years 11 months ago
A Remark on Implementing the Weil Pairing
We propose an improved implementation of modified Weil pairings. By reduction of operations in the extension field to those in the base field, we can save some operations in the...
Cheol-Min Park, Myung-Hwan Kim, Moti Yung
PKC
1999
Springer
94views Cryptology» more  PKC 1999»
14 years 2 months ago
Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor
Public-key implementers often face strong hardware-related constraints. In particular, modular operations required in most cryptosystems generally constitute a computational bottle...
Pascal Paillier
DAC
2009
ACM
14 years 10 months ago
Analysis and mitigation of process variation impacts on Power-Attack Tolerance
Embedded cryptosystems show increased vulnerabilities to implementation attacks such as power analysis. CMOS technology trends are causing increased process variations which impac...
Lang Lin, Wayne P. Burleson
ICCD
2006
IEEE
132views Hardware» more  ICCD 2006»
14 years 6 months ago
FPGA-based Design of a Large Moduli Multiplier for Public Key Cryptographic Systems
— High secure cryptographic systems require large bit-length encryption keys which presents a challenge to their efficient hardware implementation especially in embedded devices...
Osama Al-Khaleel, Christos A. Papachristou, Franci...