Sciweavers

1834 search results - page 164 / 367
» Public Key Cryptography
Sort
View
134
Voted
APNOMS
2007
Springer
15 years 8 months ago
On a Low Security Overhead Mechanism for Secure Multi-path Routing Protocol in Wireless Mesh Network
Secure multi-path routing is a critical issue in security management of WMNs due to its multi-hop nature as each node takes part in routing mechanism making it prone to routing att...
Muhammad Shoaib Siddiqui, Syed Obaid Amin, Choong ...
165
Voted
ENC
2004
IEEE
15 years 6 months ago
On the Hardware Design of an Elliptic Curve Cryptosystem
We present a hardware architecture for an Elliptic Curve Cryptography System performing the three basic cryptographic schemes: DH key generation, encryption and digital signature....
Miguel Morales-Sandoval, Claudia Feregrino Uribe
151
Voted
CCS
2008
ACM
15 years 4 months ago
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks
Multi-hop routing is essential to the operation of wireless ad hoc networks. Unfortunately, it is very easy for an adversary to forge or modify routing messages to inflict severe ...
Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig,...
105
Voted
LISA
2001
15 years 4 months ago
Crypto Blunders
Cryptography has emerged as an enormously important component of the networked world. People are hesitant to trust the World Wide Web and e-commerce without the protections crypto...
Steve Burnett
135
Voted
IPL
2007
105views more  IPL 2007»
15 years 2 months ago
Improving the arithmetic of elliptic curves in the Jacobi model
The use of elliptic curve cryptosystems on embedded systems has been becoming widespread for some years. Therefore the resistance of such cryptosystems to side-channel attacks is ...
Sylvain Duquesne