Sciweavers

404 search results - page 40 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
116
Voted
CTRSA
2010
Springer
216views Cryptology» more  CTRSA 2010»
15 years 10 months ago
Speed Records for NTRU
In this paper NTRUEncrypt is implemented for the first time on a GPU using the CUDA platform. As is shown, this operation lends itself excellently for parallelization and performs...
Jens Hermans, Frederik Vercauteren, Bart Preneel
106
Voted
PDCAT
2004
Springer
15 years 9 months ago
GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids
Today’s cryptanalysis on symmetric key cryptography is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state. However, this leads an inc...
Agus Setiawan, David Adiutama, Julius Liman, Aksha...
131
Voted
SBACPAD
2007
IEEE
143views Hardware» more  SBACPAD 2007»
15 years 10 months ago
A Code Compression Method to Cope with Security Hardware Overheads
Code Compression has been used to alleviate the memory requirements as well as to improve performance and/or minimize energy consumption. On the other hand, implementing security ...
Eduardo Wanderley Netto, Romain Vaslin, Guy Gognia...
127
Voted
ISCC
2005
IEEE
117views Communications» more  ISCC 2005»
15 years 9 months ago
Real-Time Streaming over Wireless Links: A Comparative Study
Real-time streaming over wireless links is challenging. The streaming protocol must be efficient and robust to random wireless loss, fair to itself, and friendly to legacy TCP. V...
Guang Yang 0001, Ling-Jyh Chen, Tony Sun, Mario Ge...
FC
2005
Springer
98views Cryptology» more  FC 2005»
15 years 9 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...