Sciweavers

164 search results - page 6 / 33
» Implementation of the GBD Cryptosystem
Sort
View
CANS
2009
Springer
194views Cryptology» more  CANS 2009»
14 years 4 months ago
Algebraic Attack on the MQQ Public Key Cryptosystem
Abstract. In this paper, we present an efficient attack on the multivariate Quadratic Quasigroups (MQQ) public key cryptosystem. Our cryptanalysis breaks the MQQ cryptosystem by so...
Mohamed Saied Emam Mohamed, Jintai Ding, Johannes ...
ASIACRYPT
1999
Springer
14 years 2 months ago
Periodical Multi-secret Threshold Cryptosystems
A periodical multi-secret threshold cryptosystem enables a sender to encrypt a message by using a cyclical sequence of keys which are shared by n parties and periodically updated. ...
Masayuki Numao
CHES
2004
Springer
182views Cryptology» more  CHES 2004»
14 years 3 months ago
Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems
In the current work we propose a pipelining scheme for implementing Elliptic Curve Cryptosystems (ECC). The scalar multiplication is the dominant operation in ECC. It is computed b...
Pradeep Kumar Mishra
INDOCRYPT
2001
Springer
14 years 2 months ago
A New Anonymous Fingerprinting Scheme with High Enciphering Rate
We propose a new anonymous fingerprinting scheme using Okamoto-Uchiyama cryptosystem[1]. In the previous schemes[2]-[4] the enciphering rate is so small that it seems very difficu...
Minoru Kuribayashi, Hatsukazu Tanaka
DATE
2005
IEEE
115views Hardware» more  DATE 2005»
14 years 3 months ago
Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach
— A novel power attack resistant cryptosystem is presented in this paper. Security in digital computing and communication is becoming increasingly important. Design techniques th...
Shengqi Yang, Wayne Wolf, Narayanan Vijaykrishnan,...