Sciweavers

1769 search results - page 140 / 354
» Cryptography
Sort
View
ACRI
2004
Springer
15 years 8 months ago
Block Encryption Using Reversible Cellular Automata
Cellular automata (CA) are highly parallel and discrete dynamical systems, whose behavior is completely specified in terms of a local relation. They were successfully applied for s...
Marcin Seredynski, Pascal Bouvry
105
Voted
CHES
2004
Springer
128views Cryptology» more  CHES 2004»
15 years 8 months ago
Long Modular Multiplication for Cryptographic Applications
Abstract. A digit-serial, multiplier-accumulator based cryptographic coprocessor architecture is proposed, similar to fix-point DSP's with enhancements, supporting long modula...
Laszlo Hars
CHES
2004
Springer
135views Cryptology» more  CHES 2004»
15 years 8 months ago
TTS: High-Speed Signatures on a Low-Cost Smart Card
TTS is a genre of multivariate digital signature schemes first proposed in 2002. Its public map is composed of two affine maps sandwiching a Tame Map, which is a map invertible t...
Bo-Yin Yang, Jiun-Ming Chen, Yen-Hung Chen
EUROCRYPT
2004
Springer
15 years 8 months ago
Finding Small Roots of Bivariate Integer Polynomial Equations Revisited
At Eurocrypt ’96, Coppersmith proposed an algorithm for finding small roots of bivariate integer polynomial equations, based on lattice reduction techniques. But the approach is...
Jean-Sébastien Coron
130
Voted
EUROCRYPT
2004
Springer
15 years 8 months ago
Construction of Secure Random Curves of Genus 2 over Prime Fields
For counting points of Jacobians of genus 2 curves defined over large prime fields, the best known method is a variant of Schoof’s algorithm. We present several improvements on...
Pierrick Gaudry, Éric Schost