Sciweavers

125 search results - page 17 / 25
» On the Performance of Hyperelliptic Cryptosystems
Sort
View
AFRICACRYPT
2009
Springer
13 years 6 months ago
Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware
Graphics processing units (GPU) are increasingly being used for general purpose computing. We present implementations of large integer modular exponentiation, the core of public-ke...
Owen Harrison, John Waldron
EUROCRYPT
2009
Springer
14 years 9 months ago
Smashing SQUASH-0
At the RFID Security Workshop 2007, Adi Shamir presented a new challenge-response protocol well suited for RFIDs, although based on the Rabin public-key cryptosystem. This protocol...
Khaled Ouafi, Serge Vaudenay
AFRICACRYPT
2010
Springer
14 years 1 months ago
Strong Cryptography from Weak Secrets
the full version of the extended abstract which appears in Africacrypt ’10 (3 – 6 may 2010, Stellenbosch, South Africa) D. Bernstein and T. Lange Eds., Springer-Verlag, LNCS 60...
Xavier Boyen, Céline Chevalier, Georg Fuchs...
ICPR
2008
IEEE
14 years 3 months ago
Topological structure-based alignment for fingerprint Fuzzy Vault
Because of the randomness of biometric features, traditional methods cannot perform well in the encryption of fingerprint template. The Fuzzy Vault construct is a biometric crypt...
Jianjie Li, Xin Yang, Jie Tian, Peng Shi, Peng Li
IMA
2007
Springer
129views Cryptology» more  IMA 2007»
14 years 2 months ago
Toward Acceleration of RSA Using 3D Graphics Hardware
Demand in the consumer market for graphics hardware that accelerates rendering of 3D images has resulted in commodity devices capable of astonishing levels of performance. These re...
Andrew Moss, Dan Page, Nigel P. Smart