Sciweavers

164 search results - page 2 / 33
» Implementation of the GBD Cryptosystem
Sort
View
RECONFIG
2008
IEEE
184views VLSI» more  RECONFIG 2008»
14 years 4 months ago
FPGA Implementation of an Elliptic Curve Cryptosystem over GF(3^m)
This paper describes an efficient arithmetic processor for elliptic curve cryptography. The proposed processor consists of special architectural components, the most important of...
Ilker Yavuz, Siddika Berna Ors Yalcin, Çeti...
CCS
2010
ACM
14 years 4 months ago
Cryptographic role-based security mechanisms based on role-key hierarchy
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the reso...
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
ASIACRYPT
1999
Springer
14 years 2 months ago
Fast Algorithms for Elliptic Curve Cryptosystems over Binary Finite Field
In the underlying finite field arithmetic of an elliptic curve cryptosystem, field multiplication is the next computational costly operation other than field inversion. We pres...
Yongfei Han, Peng-Chor Leong, Peng-Chong Tan, Jian...
DATE
2008
IEEE
140views Hardware» more  DATE 2008»
14 years 4 months ago
FPGA Design for Algebraic Tori-Based Public-Key Cryptography
Algebraic torus-based cryptosystems are an alternative for Public-Key Cryptography (PKC). It maintains the security of a larger group while the actual computations are performed i...
Junfeng Fan, Lejla Batina, Kazuo Sakiyama, Ingrid ...