Sciweavers

2 search results - page 1 / 1
» Public-Key Cryptography on the Top of a Needle
Sort
View
ISCAS
2007
IEEE
132views Hardware» more  ISCAS 2007»
15 years 6 months ago
Public-Key Cryptography on the Top of a Needle
Abstract— This work describes the smallest known hardware implementation for Elliptic/Hyperelliptic Curve Cryptography (ECC/HECC). We propose two solutions for Publickey Cryptogr...
Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart P...
JCS
2010
104views more  JCS 2010»
14 years 10 months ago
Finding the PKI needles in the Internet haystack
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Massimiliano Pala, Sean W. Smith