Sciweavers

1769 search results - page 67 / 354
» Cryptography
Sort
View
SACRYPT
2001
Springer
15 years 2 months ago
Two Topics in Hyperelliptic Cryptography
Florian Hess, Gadiel Seroussi, Nigel P. Smart
SACRYPT
2001
Springer
15 years 2 months ago
Timed-Release Cryptography
Wenbo Mao
ASAP
2000
IEEE
141views Hardware» more  ASAP 2000»
15 years 2 months ago
Bit Permutation Instructions for Accelerating Software Cryptography
Permutation is widely used in cryptographic algorithms. However, it is not well-supported in existing instruction sets. In this paper, two instructions, PPERM3R and GRP, are propo...
Zhijie Shi, Ruby B. Lee
CARDIS
2000
Springer
124views Hardware» more  CARDIS 2000»
15 years 2 months ago
Elliptic Curve Cryptography on Smart Cards without Coprocessors
Abstract This contribution describes how an elliptic curve cryptosystem can be implemented on very low cost microprocessors with reasonable performance. We focus in this paper on t...
Adam D. Woodbury, Daniel V. Bailey, Christof Paar