Sciweavers

488 search results - page 15 / 98
» Policy-Based Cryptography and Applications
Sort
View
USS
2008
13 years 9 months ago
Practical Symmetric Key Cryptography on Modern Graphics Hardware
Graphics processors are continuing their trend of vastly outperforming CPUs while becoming more general purpose. The latest generation of graphics processors have introduced the a...
Owen Harrison, John Waldron
CN
2007
172views more  CN 2007»
13 years 7 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
CTRSA
2005
Springer
138views Cryptology» more  CTRSA 2005»
14 years 27 days ago
CryptoGraphics: Secret Key Cryptography Using Graphics Cards
We study the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing, by exploiting the ability for GPUs to simultaneously process large quantities of pi...
Debra L. Cook, John Ioannidis, Angelos D. Keromyti...
EUROPKI
2004
Springer
14 years 23 days ago
On the Use of Weber Polynomials in Elliptic Curve Cryptography
Abstract. In many cryptographic applications it is necessary to generate elliptic curves (ECs) with certain security properties. These curves are commonly constructed using the Com...
Elisavet Konstantinou, Yannis C. Stamatiou, Christ...
IJCNN
2000
IEEE
13 years 11 months ago
A Neural Network Approach for Visual Cryptography
In this paper, we propose a neural-network approach for visual authorization. It is an application on visual cryptography. The scheme contains a key-share and a set of user-shares....
Tai-Wen Yue, Suchen Chiang