Sciweavers

29 search results - page 3 / 6
» Speeding Up the Wide-Pipe: Secure and Fast Hashing
Sort
View
SP
1998
IEEE
13 years 10 months ago
Stack and Queue Integrity on Hostile Platforms
When computationally intensive tasks have to be carried out on trusted, but limited, platforms such as smart cards, it becomes necessary to compensate for the limited resources me...
Premkumar T. Devanbu, Stuart G. Stubblebine
CORR
2010
Springer
90views Education» more  CORR 2010»
13 years 3 months ago
Fast Pseudo-Random Fingerprints
Abstract. We propose a method to exponentially speed up computation of various fingerprints, such as the ones used to compute similarity and rarity in massive data sets. Rather the...
Yoram Bachrach, Ely Porat
ICDCS
2008
IEEE
14 years 21 days ago
Fast Path Session Creation on Network Processors
The security gateways today are required not only to block unauthorized accesses by authenticating packet headers, but also by inspecting connection states to defend against malic...
Bo Xu, Yaxuan Qi, Fei He, Zongwei Zhou, Yibo Xue, ...
FAST
2003
13 years 7 months ago
Data Staging on Untrusted Surrogates
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ï¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
AES
2000
Springer
82views Cryptology» more  AES 2000»
13 years 10 months ago
Fast Implementations of AES Candidates
Of the ï¬ve AES ï¬nalists four—MARS, RC6, Rijndael, Twoï¬sh— have not only (expected) good security but also exceptional performance on the PC platforms, especially on those...
Kazumaro Aoki, Helger Lipmaa