cryptography research papers-12

cryptography research papers-12





The double-base number system and its application to elliptic curve cryptography
FREE DOWNLOAD
ABSTRACT. We describe an algorithm for point multiplication on generic elliptic curves, based on a representation of the scalar as a sum of mixed powers of 2 and 3. The sparseness of this so-called double-base number system, combined with some efficient point tripling

Security-mediated certificateless cryptography
FREE DOWNLOAD
We introduce the notion of security-mediated certificateless (SMC) cryptography. This allows more lightweight versions of mediated cryptography while maintaining the ability for instantaneous revocation of keys. Moreover, our solutions avoid key escrow, which has

Endomorphisms for faster elliptic curve cryptography on a large class of curves
FREE DOWNLOAD
ABSTRACT Efficiently computable homomorphisms allow elliptic curve point multiplication to be accelerated using the Gallant–Lambert–Vanstone (GLV) method. Iijima, Matsuo, Chao and Tsujii gave such homomorphisms for a large class of elliptic curves by working over. We

Superscalar coprocessor for high-speed curve-based cryptography
FREE DOWNLOAD
We propose a superscalar coprocessor for high-speed curve-based cryptography. It accelerates scalar multiplication by exploiting instruction-level parallelism (ILP) dynamically and processing multiple instructions in parallel. The system-level architecture is designed

The 2-adic CM method for genus 2 curves with application to cryptography
FREE DOWNLOAD
The complex multiplication (CM) method for genus 2 is currently the most efficient way of generating genus 2 hyperelliptic curves defined over large prime fields and suitable for cryptography. Since low class number might be seen as a potential threat, it is of interest

Position based cryptography
FREE DOWNLOAD
We consider what constitutes identities in cryptography. Typical examples include your name and your social-security number, or your fingerprint/iris-scan, or your address, or your (non-revoked) public-key coming from some trusted public-key infrastructure. In many

New foundations for efficient authentication, commutative cryptography, and private disjointness testing
FREE DOWNLOAD
2006 ,saweis.net ABSTRACT This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these areas fall into one of two categories:

Cryptography in theory and practice: The case of encryption in IPsec
FREE DOWNLOAD
Despite well-known results in theoretical cryptography highlighting the vulnerabilities of unauthenticated encryption, the IPsec standards mandate its support. We present evidence that such encryption-only configurations are in fact still often selected by users of IPsec in

l-Invertible Cycles for MM ultivariate QQ uadratic (MQ MQ) Public Key Cryptography
FREE DOWNLOAD
We propose a new basic trapdoor l l IC (l-Invertible Cycles) of the mixed field type for MM ultivariate QQ uadratic public key cryptosystems. This is the first new basic trapdoor since the invention of Unbalanced Oil and Vinegar in 1997. l l IC can be considered an

Leakage resilient cryptography in practice
FREE DOWNLOAD
Theoretical treatments of physical attacks have recently attracted the attention of the cryptographic community, as witnessed by various publications, eg,[1, 17, 22, 24, 29, 31, 33, 34, 42]. These works consider adversaries enhanced with abilities such as inserting faults

Arithmetic operators for pairing-based cryptography
FREE DOWNLOAD
Since their introduction in constructive cryptographic applications, pairings over (hyper) elliptic curves are at the heart of an ever increasing number of protocols. Software implementations being rather slow, the study of hardware architectures became an active

Strengthen cloud computing security with federal identity management using hierarchical identity-basedcryptography
FREE DOWNLOAD upm.edu.my More and more companies begin to provide different kinds of cloud computing services for Internet users at the same time these services also bring some security problems. Currently the majority of cloud computing systems provide digital identity for users to access their

Hardware-based public-key cryptography with public physically unclonable functions
FREE DOWNLOAD
A physically unclonable function (PUF) is a multiple-input, multiple-output, large entropy physical system that is unreproducible due to its structural complexity. A public physically unclonable function (PPUF) is a PUF that is created so that its simulation is feasible but

Founding cryptography on tamper-proof hardware tokens
FREE DOWNLOAD
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the problem of software protection via oblivious RAM. Goldwasser, Kalai, and Rothblum

Hummingbird: ultra-lightweight cryptography for resource-constrained devices
FREE DOWNLOAD
Due to the tight cost and constrained resources of high-volume consumer devices such as RFID tags, smart cards and wireless sensor nodes, it is desirable to employ lightweight and specialized cryptographic primitives for many security applications. Motivated by the

New field of cryptography: DNA cryptography
FREE DOWNLOAD
ABSTRACT DNA cryptography is a new born cryptographic field emerged with the research of DNA computing, in which DNA is used as information carrier and the modern biological technology is used as implementation tool. The vast parallelism and extraordinary

Hardware/software co-design of elliptic curve cryptography on an 8051 microcontroller
FREE DOWNLOAD
8-bit microcontrollers like the 8051 still hold a considerable share of the embedded systems market and dominate in the smart card industry. The performance of 8-bit microcontrollers is often too poor for the implementation of public-key cryptography in software. In this paper

Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
FREE DOWNLOAD
Key management for anonymous communication in mobile ad hoc networks is a critical but unsolved problem. Many current anonymous mobile ad hoc routing protocols assume that mobile users share pairwise secrets before they start an anonymous communication

Efficient hardware implementation of finite fields with applications to cryptography
FREE DOWNLOAD
ABSTRACT The paper presents a survey of most common hardware architectures for finite field arithmetic especially suitable for cryptographic applications. We discuss architectures for three types of finite fields and their special versions popularly used in cryptography: binary

Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project
FREE DOWNLOAD
We conduct more and more of our daily interactions over electronic media. The EC-funded project PRIME (Privacy and Identity Management for Europe) envisions that individuals will be able to interact in this information society in a secure and safe way while retaining

Efficient acceleration of asymmetric cryptography on graphics hardware
FREE DOWNLOAD
Graphics processing units (GPU) are increasingly being used for general purpose computing. We present implementations of large integer modular exponentiation, the core of public-key cryptosystems such as RSA, on a DirectX 10 compliant GPU. DirectX 10

Optimizing multiprecision multiplication for public key cryptography
FREE DOWNLOAD
ABSTRACT. In this paper we recall the hybrid method of Gura et al. for multi-precision multiplication [4] which is an improvement on the basic Comba method and which exploits the increased number of registers available on modern architectures in order to avoid

A milestone towards RFID products offering asymmetric authentication based on elliptic curvecryptography
FREE DOWNLOAD
ABSTRACT. After years of discussion within the RFID security community whether or not asymmetric cryptography would be feasible for RFID tags, we present a major breakthrough towards RFID products incorporating asymmetric authentication. For the challenge-

TinyECCK: Efficient elliptic curve cryptography implementation over GF (2m) on 8-bit Micaz mote
FREE DOWNLOAD
ABSTRACT. In this paper, we revisit a generally accepted opinion: implementing Elliptic Curve Cryptosystem (ECC) over GF (2m) on sensor motes using small word size is not appropriate because XOR multiplication over GF (2m) is not efficiently supported by current low-

Related

cryptography research papers-11

cryptography research papers-13 CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER