Sciweavers

CHES
2000
Springer
75views Cryptology» more  CHES 2000»
14 years 29 days ago
A 155 Mbps Triple-DES Network Encryptor
The presented Triple-DES encryptor is a single-chip solution to encrypt network communication. It is optimized for throughput and fast switching between virtual connections like fo...
Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, ...
CHES
2000
Springer
95views Cryptology» more  CHES 2000»
14 years 29 days ago
A Comparative Study of Performance of AES Final Candidates Using FPGAs
Andreas Dandalis, Viktor K. Prasanna, José ...
CHES
2000
Springer
86views Cryptology» more  CHES 2000»
14 years 29 days ago
MiniPASS: Authentication and Digital Signatures in a Constrained Environment
Abstract. We describe an implementation of the PASS polynomial authentication and signature scheme [5, 6] that is suitable for use in highly constrained environments such as SmartC...
Jeffrey Hoffstein, Joseph H. Silverman
CHES
2000
Springer
114views Cryptology» more  CHES 2000»
14 years 29 days ago
Montgomery Exponentiation with no Final Subtractions: Improved Results
The Montgomery multiplication is commonly used as the core algorithm for cryptosystems based on modular arithmetic. With the advent of new classes of attacks (timing attacks, power...
Gaël Hachez, Jean-Jacques Quisquater
ASIACRYPT
2000
Springer
14 years 29 days ago
Towards Signature-Only Signature Schemes
We consider a problem which was stated in a request for comments made by NIST in the FIPS97 document. The question is the following: Can we have a digital signature public key infr...
Adam Young, Moti Yung
ASIACRYPT
2000
Springer
14 years 29 days ago
Proofs of Security for the Unix Password Hashing Algorithm
We give the first proof of security for the full Unix password hashing algorithm (rather than of a simplified variant). Our results show that it is very good at extracting almost...
David Wagner, Ian Goldberg
ASIACRYPT
2000
Springer
14 years 29 days ago
Cryptanalysis of the Yi-Lam Hash
David Wagner
ASIACRYPT
2000
Springer
14 years 29 days ago
On Relationships among Avalanche, Nonlinearity, and Correlation Immunity
We establish, for the first time, an explicit and simple lower bound on the nonlinearity Nf of a Boolean function f of n variables satisfying the avalanche criterion of degree p, ...
Yuliang Zheng, Xian-Mo Zhang
ASIACRYPT
2000
Springer
14 years 29 days ago
Security of Signed ElGamal Encryption
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against ...
Claus-Peter Schnorr, Markus Jakobsson
ASIACRYPT
2000
Springer
14 years 29 days ago
On the Pseudorandomness of Top-Level Schemes of Block Ciphers
Block ciphers are usually based on one top-level scheme into which we plug “round functions”. To analyze security, it is important to study the intrinsic security provided by t...
Shiho Moriai, Serge Vaudenay