Sciweavers

164 search results - page 1 / 33
» Implementation of the GBD Cryptosystem
Sort
View
CAU
2004
141views Cryptology» more  CAU 2004»
13 years 7 months ago
Implementation of the GBD Cryptosystem
We present our experience from implementing the public-key cryptosystem of Gonz
Jaimee Brown, Ed Dawson, Juan Manuel Gonzál...
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
13 years 11 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas
KES
2005
Springer
13 years 11 months ago
Weak Key Analysis and Micro-controller Implementation of CA Stream Ciphers
Abstract. In the paper we extend known results studying the application of CAs for stream ciphers. We illustrate the notion of weak keys in such a cryptosystem and describe the exp...
Pascal Bouvry, Gilbert Klein, Franciszek Seredynsk...
QUANTUMCOMM
2009
Springer
14 years 25 days ago
Improvement of Lattice-Based Cryptography Using CRT
Abstract. In this paper, we first critically analyze two existing latticebased cryptosystems, namely GGH and Micciancio, and identify their drawbacks. Then, we introduce a method ...
Thomas Plantard, Mike Rose, Willy Susilo
ARITH
1999
IEEE
13 years 10 months ago
Moduli for Testing Implementations of the RSA Cryptosystem
Comprehensive testing of any implementation of the RSA cryptosystem requires the use of a number of moduli with specific properties. It is shown how to generate a sufficient varie...
Colin D. Walter