Sciweavers

46 search results - page 1 / 10
» crypto 2005
Sort
View
94
Voted
CRYPTO
2005
Springer
117views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
An Efficient CDH-Based Signature Scheme with a Tight Security Reduction
Benoît Chevallier-Mames
CRYPTO
2005
Springer
115views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
Private Searching on Streaming Data
Rafail Ostrovsky, William E. Skeith III
CRYPTO
2005
Springer
111views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
Finding Collisions in the Full SHA-1
In this paper, we present new collision search attacks on the
Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu
88
Voted
DAC
2005
ACM
16 years 4 months ago
Secure scan: a design-for-test architecture for crypto chips
Bo Yang, Kaijie Wu, Ramesh Karri
CTRSA
2005
Springer
138views Cryptology» more  CTRSA 2005»
15 years 9 months ago
CryptoGraphics: Secret Key Cryptography Using Graphics Cards
We study the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing, by exploiting the ability for GPUs to simultaneously process large quantities of pi...
Debra L. Cook, John Ioannidis, Angelos D. Keromyti...