Sciweavers

55 search results - page 2 / 11
» crypto 2004
Sort
View
CRYPTO
2004
Springer
109views Cryptology» more  CRYPTO 2004»
13 years 10 months ago
On the Bounded Sum-of-Digits Discrete Logarithm Problem in Finite Fields
In this paper, we study the bounded sum-of-digits discrete logarithm problem in finite fields. Our results concern primarily with
Qi Cheng
ARCS
2004
Springer
13 years 10 months ago
Modelling Cryptonite - On the Design of a Programmable High-Performance Crypto Processor
: Cryptographic algorithms – even when designed for easy implementability on general purpose architectures – still show a huge performance gap between implementations in softwa...
Rainer Buchty
ISSA
2004
13 years 6 months ago
High Data Rate 8-Bit Crypto Processor
This paper describes a high data rate 8-bit Crypto Processor based on Advanced Encryption Standard (Rijndael algorithm). Though the algorithm requires 32-bit wide data path but ou...
Sheikh Muhammad Farhan
ARCS
2004
Springer
13 years 10 months ago
Cryptonite - A Programmable Crypto Processor Architecture for High-Bandwidth Applications
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...
Rainer Buchty, Nevin Heintze, Dino Oliva
CRYPTO
2004
Springer
154views Cryptology» more  CRYPTO 2004»
13 years 10 months ago
An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators
Abstract. In this paper we propose a new key recovery attack on irregular clocked keystream generators where the stream is filtered by a nonlinear Boolean function. We show that t...
Håvard Molland, Tor Helleseth