Sciweavers

1769 search results - page 63 / 354
» Cryptography
Sort
View
CTRSA
2005
Springer
138views Cryptology» more  CTRSA 2005»
15 years 3 months ago
CryptoGraphics: Secret Key Cryptography Using Graphics Cards
We study the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing, by exploiting the ability for GPUs to simultaneously process large quantities of pi...
Debra L. Cook, John Ioannidis, Angelos D. Keromyti...
IMA
2005
Springer
162views Cryptology» more  IMA 2005»
15 years 3 months ago
Pairing-Based Cryptography at High Security Levels
In recent years cryptographic protocols based on the Weil and Tate pairings on elliptic curves have attracted much attention. A notable success in this area was the elegant solutio...
Neal Koblitz, Alfred Menezes
SAFECOMP
2005
Springer
15 years 3 months ago
Public-Key Cryptography and Availability
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security...
Tage Stabell-Kulø, Simone Lupetti
BIRTHDAY
2004
Springer
15 years 3 months ago
DNA-based Cryptography
Ashish Gehani, Thomas H. LaBean, John H. Reif