Sciweavers

1769 search results - page 73 / 354
» Cryptography
Sort
View
CHES
2008
Springer
132views Cryptology» more  CHES 2008»
14 years 11 months ago
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography
Bit-slicing is a non-conventional implementation technique for cryptographic software where an n-bit processor is considered as a collection of n 1-bit execution units operating in...
Philipp Grabher, Johann Großschädl, Dan...
CHES
2008
Springer
108views Cryptology» more  CHES 2008»
14 years 11 months ago
Exploiting the Power of GPUs for Asymmetric Cryptography
Modern Graphics Processing Units (GPU) have reached a dimension with respect to performance and gate count exceeding conventional Central Processing Units (CPU) by far. Many modern...
Robert Szerwinski, Tim Güneysu
DIM
2005
ACM
14 years 11 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
DAGSTUHL
2007
14 years 11 months ago
07021 Abstracts Collection -- Symmetric Cryptography
Eli Biham, Helena Handschuh, Stefan Lucks, Vincent...
DAGSTUHL
2007
14 years 11 months ago
07381 Abstracts Collection -- Cryptography
Johannes Blömer, Dan Boneh, Ronald Cramer, Ue...