Sciweavers

233 search results - page 9 / 47
» Data Encryption Using MRF with an RSA Key
Sort
View
90
Voted
ICCD
2006
IEEE
132views Hardware» more  ICCD 2006»
15 years 8 months ago
FPGA-based Design of a Large Moduli Multiplier for Public Key Cryptographic Systems
— High secure cryptographic systems require large bit-length encryption keys which presents a challenge to their efficient hardware implementation especially in embedded devices...
Osama Al-Khaleel, Christos A. Papachristou, Franci...
DICTA
2007
15 years 1 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
STORAGESS
2005
ACM
15 years 5 months ago
Key management for multi-user encrypted databases
Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service (DAS), where an organization’s database is stored at an external s...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
EUROCRYPT
2004
Springer
15 years 5 months ago
Public Key Encryption with Keyword Search
We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An ema...
Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky...
96
Voted
ASAP
2005
IEEE
96views Hardware» more  ASAP 2005»
15 years 5 months ago
On-Chip Lookup Tables for Fast Symmetric-Key Encryption
On public communication networks such as the Internet, data confidentiality can be provided by symmetric-key ciphers. One of the most common operations used in symmetric-key ciphe...
A. Murat Fiskiran, Ruby B. Lee