Sciweavers

CTRSA
2001
Springer
140views Cryptology» more  CTRSA 2001»
13 years 9 months ago
Fast Implementation and Fair Comparison of the Final Candidates for Advanced Encryption Standard Using Field Programmable Gate A
The results of fast implementations of all five AES final candidates using Virtex Xilinx Field Programmable Gate Arrays are presented and analyzed. Performance of several alternati...
Kris Gaj, Pawel Chodowiec
CTRSA
2001
Springer
139views Cryptology» more  CTRSA 2001»
13 years 9 months ago
Security Weaknesses in Bluetooth
We point to three types of potential vulnerabilities in the
Markus Jakobsson, Susanne Wetzel
CTRSA
2001
Springer
129views Cryptology» more  CTRSA 2001»
13 years 9 months ago
Formal Security Proofs for a Signature Scheme with Partial Message Recovery
The Pintsov-Vanstone signature scheme with partial message recovery (PVSSR) is a variant of the Schnorr and Nyberg-Rueppel signature schemes. It produces very short signatures on ...
Daniel R. L. Brown, Donald Byron Johnson
CTRSA
2001
Springer
122views Cryptology» more  CTRSA 2001»
13 years 9 months ago
Password Authentication Using Multiple Servers
Safe long-term storage of user private keys is a problem in client/server systems. The problem can be addressed with a roaming system that retrieves keys on demand from remote cred...
David P. Jablon
CTRSA
2001
Springer
121views Cryptology» more  CTRSA 2001»
13 years 9 months ago
Software Implementation of the NIST Elliptic Curves Over Prime Fields
Michael Brown, Darrel Hankerson, Julio Lópe...
Cryptology
Top of PageReset Settings