Sciweavers

2108 search results - page 128 / 422
» Encrypted
Sort
View
128
Voted
ASAP
2005
IEEE
96views Hardware» more  ASAP 2005»
15 years 9 months ago
On-Chip Lookup Tables for Fast Symmetric-Key Encryption
On public communication networks such as the Internet, data confidentiality can be provided by symmetric-key ciphers. One of the most common operations used in symmetric-key ciphe...
A. Murat Fiskiran, Ruby B. Lee
CTRSA
2005
Springer
128views Cryptology» more  CTRSA 2005»
15 years 9 months ago
Simple Password-Based Encrypted Key Exchange Protocols
Michel Abdalla, David Pointcheval