Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
CTRSA
2001
Springer
108views Cryptology» more  CTRSA 2001»
11 years 9 months ago
Improving SSL Handshake Performance via Batching
We present an algorithmic approach for speeding up SSL’s performance on a web server. Our approach improves the performance of SSL’s handshake protocol by up to a factor of 2....
Hovav Shacham, Dan Boneh
CTRSA
2001
Springer
140views Cryptology» more  CTRSA 2001»
11 years 9 months ago
Fast Implementation and Fair Comparison of the Final Candidates for Advanced Encryption Standard Using Field Programmable Gate A
The results of fast implementations of all five AES final candidates using Virtex Xilinx Field Programmable Gate Arrays are presented and analyzed. Performance of several alternati...
Kris Gaj, Pawel Chodowiec
CTRSA
2001
Springer
121views Cryptology» more  CTRSA 2001»
11 years 9 months ago
REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform
a revised version of the extended abstract which appeared in The Cryptographers’ Track at RSA Conference ’2001 (8 – 12 april 2001, San Francisco, California, USA)
Tatsuaki Okamoto, David Pointcheval
CTRSA
2001
Springer
109views Cryptology» more  CTRSA 2001»
11 years 9 months ago
Uncheatable Distributed Computations
Computationally expensive tasks that can be parallelized are most efficiently completed by distributing the computation among a large number of processors. The growth of the Intern...
Philippe Golle, Ilya Mironov
CTRSA
2001
Springer
129views Cryptology» more  CTRSA 2001»
11 years 9 months ago
Formal Security Proofs for a Signature Scheme with Partial Message Recovery
The Pintsov-Vanstone signature scheme with partial message recovery (PVSSR) is a variant of the Schnorr and Nyberg-Rueppel signature schemes. It produces very short signatures on ...
Daniel R. L. Brown, Donald Byron Johnson
CTRSA
2001
Springer
121views Cryptology» more  CTRSA 2001»
11 years 9 months ago
Software Implementation of the NIST Elliptic Curves Over Prime Fields
Michael Brown, Darrel Hankerson, Julio Lópe...
CTRSA
2001
Springer
122views Cryptology» more  CTRSA 2001»
11 years 9 months ago
Password Authentication Using Multiple Servers
Safe long-term storage of user private keys is a problem in client/server systems. The problem can be addressed with a roaming system that retrieves keys on demand from remote cred...
David P. Jablon
CTRSA
2001
Springer
87views Cryptology» more  CTRSA 2001»
11 years 9 months ago
On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC
Marc Joye, Jean-Jacques Quisquater, Moti Yung
CTRSA
2001
Springer
139views Cryptology» more  CTRSA 2001»
11 years 9 months ago
Security Weaknesses in Bluetooth
We point to three types of potential vulnerabilities in the
Markus Jakobsson, Susanne Wetzel
books