Sciweavers

1769 search results - page 68 / 354
» Cryptography
Sort
View
CHES
1999
Springer
91views Cryptology» more  CHES 1999»
15 years 2 months ago
A High-Performance Flexible Architecture for Cryptography
Cryptographic algorithms are more efficiently implemented in custom hardware than in software running on general-purpose processors. However, systems which use hardware implementat...
R. Reed Taylor, Seth Copen Goldstein
CRYPTO
1999
Springer
63views Cryptology» more  CRYPTO 1999»
15 years 2 months ago
Information-Theoretic Cryptography
Ueli M. Maurer
IMA
1999
Springer
108views Cryptology» more  IMA 1999»
15 years 2 months ago
Tensor-Based Trapdoors for CVP and Their Application to Public Key Cryptography
We propose two trapdoors for the Closest-Vector-Problem in lattices (CVP) related to the lattice tensor product. Using these trapdoors we set up a lattice-based cryptosystem which ...
Roger Fischlin, Jean-Pierre Seifert
AC
1998
Springer
15 years 2 months ago
Emerging Standards for Public-Key Cryptography
Burton S. Kaliski Jr.
CARDIS
1998
Springer
111views Hardware» more  CARDIS 1998»
15 years 2 months ago
Smart Card Crypto-Coprocessors for Public-Key Cryptography
This paper intends to provide information about up-to-date performances of smart-card arithmetic coprocessors regarding major public-key cryptosystems and analyze the main tendence...
Helena Handschuh, Pascal Paillier