Sciweavers

2108 search results - page 55 / 422
» Encrypted
Sort
View
138
Voted
ISPASS
2003
IEEE
15 years 6 months ago
Accelerating private-key cryptography via multithreading on symmetric multiprocessors
Achieving high performance in cryptographic processing is important due to the increasing connectivity among today’s computers. Despite steady improvements in microprocessor and...
Praveen Dongara, T. N. Vijaykumar
126
Voted
ACSAC
1999
IEEE
15 years 5 months ago
Trustworthy Access Control with Untrustworthy Web Servers
If sensitive information is to be included in a shared web, access controls will be required. However, the complex software needed to provide a web service is prone to failure. To...
Tim Wilkinson, Dave Hearn, Simon R. Wiseman
ACISP
1998
Springer
15 years 5 months ago
On Private-Key Cryptosystems Based on Product Codes
Recently J. and R.M. Campello de Souza proposed a private-key encryption scheme based on the product codes with the capability of correcting a special type of structured errors. In...
Hung-Min Sun, Shiuh-Pyng Shieh
99
Voted
CARDIS
1998
Springer
141views Hardware» more  CARDIS 1998»
15 years 5 months ago
The Block Cipher Rijndael
In this paper we present the block cipher Rijndael, which is one of the fifteen candidate algorithms for the Advanced Encryption Standard (AES). We show that the cipher can be impl...
Joan Daemen, Vincent Rijmen
IMA
1997
Springer
105views Cryptology» more  IMA 1997»
15 years 5 months ago
Split Knowledge Generation of RSA Parameters
We show how it is possible for two parties to co-operate in generating the parameters for an RSA encryption system in such a way that neither individually has the ability to decry...
Clifford Cocks