Sciweavers

55 search results - page 2 / 11
» crypto 2004
Sort
View
54
Voted
CRYPTO
2004
Springer
109views Cryptology» more  CRYPTO 2004»
15 years 2 months ago
On the Bounded Sum-of-Digits Discrete Logarithm Problem in Finite Fields
In this paper, we study the bounded sum-of-digits discrete logarithm problem in finite fields. Our results concern primarily with
Qi Cheng
ARCS
2004
Springer
15 years 2 months ago
Modelling Cryptonite - On the Design of a Programmable High-Performance Crypto Processor
: Cryptographic algorithms – even when designed for easy implementability on general purpose architectures – still show a huge performance gap between implementations in softwa...
Rainer Buchty
ISSA
2004
14 years 10 months ago
High Data Rate 8-Bit Crypto Processor
This paper describes a high data rate 8-bit Crypto Processor based on Advanced Encryption Standard (Rijndael algorithm). Though the algorithm requires 32-bit wide data path but ou...
Sheikh Muhammad Farhan
ARCS
2004
Springer
15 years 2 months ago
Cryptonite - A Programmable Crypto Processor Architecture for High-Bandwidth Applications
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...
Rainer Buchty, Nevin Heintze, Dino Oliva
CRYPTO
2004
Springer
154views Cryptology» more  CRYPTO 2004»
15 years 2 months ago
An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators
Abstract. In this paper we propose a new key recovery attack on irregular clocked keystream generators where the stream is filtered by a nonlinear Boolean function. We show that t...
Håvard Molland, Tor Helleseth