Sciweavers

4529 search results - page 20 / 906
» Position Based Cryptography
Sort
View
ISCAS
2007
IEEE
132views Hardware» more  ISCAS 2007»
15 years 8 months ago
Public-Key Cryptography on the Top of a Needle
Abstract— This work describes the smallest known hardware implementation for Elliptic/Hyperelliptic Curve Cryptography (ECC/HECC). We propose two solutions for Publickey Cryptogr...
Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart P...
ISCAS
2008
IEEE
154views Hardware» more  ISCAS 2008»
15 years 8 months ago
A 6.3nJ/op low energy 160-bit modulo-multiplier for elliptic curve cryptography processor
— A low energy modulo-multiplier is proposed for elliptic curve cryptography (ECC) processor, especially for authentication in mobile device or key encryption in embedded health-...
Hyejung Kim, Yongsang Kim, Hoi-Jun Yoo
DCC
2007
IEEE
16 years 1 months ago
Towards generating secure keys for braid cryptography
Abstract. Braid cryptosystem was proposed in CRYPTO 2000 as an alternate public-key cryptosystem. The security of this system is based upon the conjugacy problem in braid groups. S...
Ki Hyoung Ko, Jang-Won Lee, Tony Thomas
FDL
2007
IEEE
15 years 5 months ago
A Domain Specific Language for Cryptography
In this paper, we propose a domain specific language for the development of hardware/software cryptographic systems based on the well known Python programming language. It is desi...
Giovanni Agosta, Gerardo Pelosi
CHES
2010
Springer
132views Cryptology» more  CHES 2010»
15 years 2 months ago
Efficient Techniques for High-Speed Elliptic Curve Cryptography
In this paper, a thorough bottom-up optimization process (field, point and scalar arithmetic) is used to speed up the computation of elliptic curve point multiplication and report ...
Patrick Longa, Catherine H. Gebotys