Sciweavers

4340 search results - page 40 / 868
» Formal Methods and Cryptography
Sort
View
68
Voted
ARITH
1993
IEEE
15 years 3 months ago
Fast implementations of RSA cryptography
We detail and analyse the critical techniques which may be combined in the design of fast hardware for RSA cryptography: chinese remainders, star chains, Hensel's odd divisio...
Mark Shand, Jean Vuillemin
IJNSEC
2010
163views more  IJNSEC 2010»
14 years 6 months ago
Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types
As the importance and the value of exchanged data over the Internet or other media types are increasing, the search for the best solution to offer the necessary protection against...
Diaa Salama Abdul Minaam, Hatem M. Abdual-Kader, M...
IMA
2005
Springer
85views Cryptology» more  IMA 2005»
15 years 5 months ago
The Physically Observable Security of Signature Schemes
In recent years much research has been devoted to producing formal models of security for cryptographic primitives and to designing schemes that can be proved secure in such models...
Alexander W. Dent, John Malone-Lee
104
Voted
LICS
1999
IEEE
15 years 4 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
FM
2008
Springer
135views Formal Methods» more  FM 2008»
15 years 1 months ago
Secret Ninja Formal Methods
The use of formal methods can significantly improve software quality. However, many instructors and students consider formal methods to be too difficult, impractical, and esoteric ...
Joseph R. Kiniry, Daniel M. Zimmerman