Sciweavers

1769 search results - page 60 / 354
» Cryptography
Sort
View
ICDCSW
2007
IEEE
15 years 4 months ago
Exploring Symmetric Cryptography for Secure Network Reprogramming
Recent secure code-update protocols for sensor networks have been based on asymmetric-crypto primitives such as digital signatures. Our approach, Castor, explores the feasibility ...
Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan
ASIACRYPT
2007
Springer
15 years 4 months ago
Symmetric Key Cryptography on Modern Graphics Hardware
Abstract. GPUs offer a tremendous amount of computational bandwidth that was until now largely unusable for cryptographic computations due to a lack of integer arithmetic and user...
Jason Yang, James Goodman
CRYPTO
2007
Springer
110views Cryptology» more  CRYPTO 2007»
15 years 3 months ago
Cryptography in the Multi-string Model
The common random string model introduced by Blum, Feldman and Micali permits the construction of cryptographic protocols that are provably impossible to realize in the standard m...
Jens Groth, Rafail Ostrovsky
CRYPTO
2007
Springer
123views Cryptology» more  CRYPTO 2007»
15 years 3 months ago
Cryptography with Constant Input Locality
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
OTM
2007
Springer
15 years 3 months ago
Compiler Assisted Elliptic Curve Cryptography
Abstract. Although cryptographic implementation tasks are often undertaken by expert programmers, a plethora of performance and security driven options, as well as more mundane sof...
Manuel Barbosa, Andrew Moss, Dan Page