Sciweavers

20175 search results - page 93 / 4035
» Is abstraction the key to computing
Sort
View
COMPSEC
2000
112views more  COMPSEC 2000»
15 years 14 days ago
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture
paper, the unified, abstract KEYSTONE Public Key Infrastructure is presented.This architecture consists of a reference model, a functional architecture specification, and a set of ...
Stefanos Gritzalis, Sokratis K. Katsikas, Dimitrio...
100
Voted
JOC
2000
78views more  JOC 2000»
15 years 13 days ago
Practical Aspects of Quantum Cryptographic Key Distribution
Abstract. Performance of various experimental realizations of quantum cryptographic protocols using polarization or phase coding are compared, including a new self-balanced interfe...
Hugo Zbinden, Nicolas Gisin, B. Huttner, A. Muller...
108
Voted
INDOCRYPT
2010
Springer
14 years 10 months ago
Partial Key Exposure Attack on RSA - Improvements for Limited Lattice Dimensions
Abstract. Consider the RSA public key cryptosystem with the parameters N = pq, q < p < 2q, public encryption exponent e and private decryption exponent d. In this paper, cryp...
Santanu Sarkar, Sourav Sengupta, Subhamoy Maitra
ARC
2009
Springer
181views Hardware» more  ARC 2009»
15 years 7 months ago
CCproc: A Custom VLIW Cryptography Co-processor for Symmetric-Key Ciphers
Abstract. In this paper, we present CCProc, a flexible cryptography coprocessor for symmetric-key algorithms. Based on an extensive analysis of many symmetric-key ciphers, includi...
Dimitris Theodoropoulos, Alexandros Siskos, Dionis...
84
Voted
VTC
2007
IEEE
106views Communications» more  VTC 2007»
15 years 7 months ago
The BICM Capacity of Coherent Continuous-Phase Frequency Shift Keying
Abstract— This paper presents a methodology for determining the capacity of coherently detected continuousphase frequency shift keying (CPFSK) modulation under the constraints of...
Rohit Iyer Seshadri, Shi Cheng, Matthew C. Valenti