cryptography research papers-12
The double-base number system and its application to elliptic curve cryptography
FREE DOWNLOAD
ABSTRACT. We describe an algorithm for point multiplication on generic elliptic curves, based on a representation of the scalar as a sum of mixed powers of 2 and 3. The sparseness of this so-called double-base number system, combined with some efficient point tripling
Security-mediated certificateless cryptography
FREE DOWNLOAD
We introduce the notion of security-mediated certificateless (SMC) cryptography. This allows more lightweight versions of mediated cryptography while maintaining the ability for instantaneous revocation of keys. Moreover, our solutions avoid key escrow, which has
Endomorphisms for faster elliptic curve cryptography on a large class of curves
FREE DOWNLOAD
ABSTRACT Efficiently computable homomorphisms allow elliptic curve point multiplication to be accelerated using the Gallant–Lambert–Vanstone (GLV) method. Iijima, Matsuo, Chao and Tsujii gave such homomorphisms for a large class of elliptic curves by working over. We
Superscalar coprocessor for high-speed curve-based cryptography
FREE DOWNLOAD
We propose a superscalar coprocessor for high-speed curve-based cryptography. It accelerates scalar multiplication by exploiting instruction-level parallelism (ILP) dynamically and processing multiple instructions in parallel. The system-level architecture is designed
The 2-adic CM method for genus 2 curves with application to cryptography
FREE DOWNLOAD
The complex multiplication (CM) method for genus 2 is currently the most efficient way of generating genus 2 hyperelliptic curves defined over large prime fields and suitable for cryptography. Since low class number might be seen as a potential threat, it is of interest
Position based cryptography
FREE DOWNLOAD
We consider what constitutes identities in cryptography. Typical examples include your name and your social-security number, or your fingerprint/iris-scan, or your address, or your (non-revoked) public-key coming from some trusted public-key infrastructure. In many
New foundations for efficient authentication, commutative cryptography, and private disjointness testing
FREE DOWNLOAD
2006 ,saweis.net ABSTRACT This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these areas fall into one of two categories:
Cryptography in theory and practice: The case of encryption in IPsec
FREE DOWNLOAD
Despite well-known results in theoretical cryptography highlighting the vulnerabilities of unauthenticated encryption, the IPsec standards mandate its support. We present evidence that such encryption-only configurations are in fact still often selected by users of IPsec in
l-Invertible Cycles for MM ultivariate QQ uadratic (MQ MQ) Public Key Cryptography
FREE DOWNLOAD
We propose a new basic trapdoor l l IC (l-Invertible Cycles) of the mixed field type for MM ultivariate QQ uadratic public key cryptosystems. This is the first new basic trapdoor since the invention of Unbalanced Oil and Vinegar in 1997. l l IC can be considered an
Leakage resilient cryptography in practice
FREE DOWNLOAD
Theoretical treatments of physical attacks have recently attracted the attention of the cryptographic community, as witnessed by various publications, eg,[1, 17, 22, 24, 29, 31, 33, 34, 42]. These works consider adversaries enhanced with abilities such as inserting faults
Arithmetic operators for pairing-based cryptography
FREE DOWNLOAD
Since their introduction in constructive cryptographic applications, pairings over (hyper) elliptic curves are at the heart of an ever increasing number of protocols. Software implementations being rather slow, the study of hardware architectures became an active
Strengthen cloud computing security with federal identity management using hierarchical identity-basedcryptography
FREE DOWNLOAD upm.edu.my More and more companies begin to provide different kinds of cloud computing services for Internet users at the same time these services also bring some security problems. Currently the majority of cloud computing systems provide digital identity for users to access their
Hardware-based public-key cryptography with public physically unclonable functions
FREE DOWNLOAD
A physically unclonable function (PUF) is a multiple-input, multiple-output, large entropy physical system that is unreproducible due to its structural complexity. A public physically unclonable function (PPUF) is a PUF that is created so that its simulation is feasible but
Founding cryptography on tamper-proof hardware tokens
FREE DOWNLOAD
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the problem of software protection via oblivious RAM. Goldwasser, Kalai, and Rothblum
Hummingbird: ultra-lightweight cryptography for resource-constrained devices
FREE DOWNLOAD
Due to the tight cost and constrained resources of high-volume consumer devices such as RFID tags, smart cards and wireless sensor nodes, it is desirable to employ lightweight and specialized cryptographic primitives for many security applications. Motivated by the
New field of cryptography: DNA cryptography
FREE DOWNLOAD
ABSTRACT DNA cryptography is a new born cryptographic field emerged with the research of DNA computing, in which DNA is used as information carrier and the modern biological technology is used as implementation tool. The vast parallelism and extraordinary
Hardware/software co-design of elliptic curve cryptography on an 8051 microcontroller
FREE DOWNLOAD
8-bit microcontrollers like the 8051 still hold a considerable share of the embedded systems market and dominate in the smart card industry. The performance of 8-bit microcontrollers is often too poor for the implementation of public-key cryptography in software. In this paper
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
FREE DOWNLOAD
Key management for anonymous communication in mobile ad hoc networks is a critical but unsolved problem. Many current anonymous mobile ad hoc routing protocols assume that mobile users share pairwise secrets before they start an anonymous communication
Efficient hardware implementation of finite fields with applications to cryptography
FREE DOWNLOAD
ABSTRACT The paper presents a survey of most common hardware architectures for finite field arithmetic especially suitable for cryptographic applications. We discuss architectures for three types of finite fields and their special versions popularly used in cryptography: binary
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project
FREE DOWNLOAD
We conduct more and more of our daily interactions over electronic media. The EC-funded project PRIME (Privacy and Identity Management for Europe) envisions that individuals will be able to interact in this information society in a secure and safe way while retaining
Efficient acceleration of asymmetric cryptography on graphics hardware
FREE DOWNLOAD
Graphics processing units (GPU) are increasingly being used for general purpose computing. We present implementations of large integer modular exponentiation, the core of public-key cryptosystems such as RSA, on a DirectX 10 compliant GPU. DirectX 10
Optimizing multiprecision multiplication for public key cryptography
FREE DOWNLOAD
ABSTRACT. In this paper we recall the hybrid method of Gura et al. for multi-precision multiplication [4] which is an improvement on the basic Comba method and which exploits the increased number of registers available on modern architectures in order to avoid
A milestone towards RFID products offering asymmetric authentication based on elliptic curvecryptography
FREE DOWNLOAD
ABSTRACT. After years of discussion within the RFID security community whether or not asymmetric cryptography would be feasible for RFID tags, we present a major breakthrough towards RFID products incorporating asymmetric authentication. For the challenge-
TinyECCK: Efficient elliptic curve cryptography implementation over GF (2m) on 8-bit Micaz mote
FREE DOWNLOAD
ABSTRACT. In this paper, we revisit a generally accepted opinion: implementing Elliptic Curve Cryptosystem (ECC) over GF (2m) on sensor motes using small word size is not appropriate because XOR multiplication over GF (2m) is not efficiently supported by current low-
Related
- Quantum cryptography in real life applications
- visual cryptography-3
- Quantum cryptography-3
- Quantum cryptography-3
- new quantum cryptography protocols
cryptography research papers-11
cryptography research papers-13 CSE PROJECTS