Filters








898 Hits in 2.2 sec

Fast Checkers for Cryptography [chapter]

Kireeti Kompella, Leonard Adleman
Advances in Cryptology-CRYPT0' 90  
O n the other hand, the price for increased confidence is increased computation, making fast checkers especially attractive. . . . for Cryptography If the average user is concerned about program correctness  ...  run much faster than any program for x ; such a checker will be called fast.  ...  Output 'CORRECT.' e n d Open Problems An important open problem is whether there exists a constant-query checker for modular exponentiation. Such a checker could prove useful in cryptography.  ... 
doi:10.1007/3-540-38424-3_36 dblp:conf/crypto/KompellaA90 fatcat:42357gcl55afjnlpladllz5ktq

Incremental Cryptography and Memory Checkers [chapter]

Marc Fischlin
1997 Lecture Notes in Computer Science  
We introduce the relationship between incremental cryptography and memory checkers.  ...  From this scheme we derive memory checkers for data structures based on lists.  ...  Acknowledgements We thank Roger Fischlin for pointing out the topic of memory checkers and C.P. Schnorr and the anonymous referees for their comments.  ... 
doi:10.1007/3-540-69053-0_27 fatcat:532uwhnkdrhklfn6mwua4kltfi

Page 5881 of Mathematical Reviews Vol. , Issue 99h [page]

1999 Mathematical Reviews  
We find surprisingly fast batch verifiers for this relation. We also find efficient batch verifiers for the degrees of polynomials.  ...  ISBN 0-444-82873-7 This is a cryptography book which focuses on methods for produc- ing keystream sequences for stream ciphers.  ... 

Unique Data Integrity in Public Cloud

Pasupuleti Veeramma, Ford Lumban Gaol, Chi Hao
2013 International Journal of Reliable Information and Assurance  
From the security issues, we propose a novel intermediary situated information transferring and remote information honesty checking model in identity-based public key cryptography: identity-based proxy-oriented  ...  Introduction Along with the fast improvement of processing and correspondence system, a lot of information is produced.  ...  Sometimes, the cryptographic operation will be designated to the outsider, for instance intermediary. Along these lines, we need to utilize the intermediary cryptography.  ... 
doi:10.21742/ijria.2013.1.1.04 fatcat:jdjpnhyvhvgnvpsmrhzbzyloli

Crypto-integrity [chapter]

Moti Yung
2002 Lecture Notes in Computer Science  
We review the need for crypto-integrity in various known settings, ways to implement it based on known protocol techniques as well as potential future directions.  ...  In this setting, given arbitrary input α and program P , a checker C for a function f will catch, with high probability, if P (α) = f (α).  ...  Introduction Integrity assurance is a part of many modern cryptography constructions.  ... 
doi:10.1007/3-540-36178-2_35 fatcat:w4ydprherzawlc3zynft2sr7ve

A Novel Approach for Data Uploading and Remote Data Integrity Checking Based On Public Key Cryptography

K.Lakshmi Ragini, V.Rani Mounika, K. Sandeep
2017 International Journal of Advanced engineering Management and Science  
From the security problems we propose "A NOVEL APPROACH FOR DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING BASED ON PUBLIC KEY CRYPTOGRAPHY" (ANDURIC-PKC).  ...  INTRODUCTION Along with the fast development of computing and communication technique, an excellent deal of information area unit generated.  ...  cryptography. .  ... 
doi:10.24001/ijaems.3.4.9 fatcat:xz2zox4fc5bi3fvynbmrw7lggy

Page 6065 of Mathematical Reviews Vol. , Issue 98I [page]

1998 Mathematical Reviews  
for cryptosystems defined over Fy (379-392); Marc Fischlin, Incremental cryptography and memory checkers (393-408); Kaoru Kurosawa, Thomas Johansson and Douglas Stinson, Almost k-wise independent sample  ...  : us- ing cryptography against cryptography (62-74); Ronald Cramer and Ivan Damgard, Fast and secure immunization against adaptive man-in-the-middle impersonation (75-87); Birgit Pfitzmann and Michael  ... 

Workshop on Fault Diagnosis and Tolerance in Cryptography-Title

2007 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007)  
fast designs in Suitable for fast designs in slower systems slower systems DDR DDR 13% 13% 77% 77% Non Non--linear scalable linear scalable cubic network cubic network Non Non--linear  ...  : elements of the partitions are interleaved both in By checkers: elements of the partitions are interleaved both in columns columns and rows, like a chess board and rows, like a chess boardData Alignment  ... 
doi:10.1109/fdtc.2007.1 fatcat:hukyi5b2uzephiezszph6267he

An SFS Berger check prediction ALU and its application to self-checking processor designs

J.-C. Lo, S. Thanawastien, T.R.N. Rao, M. Nicolaidis
1992 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
It should be mentioned that TSC checkers actually are all TSC and CD combinational circuits. Therefore, the TSC checkers using PLA can be obtained by this design method.  ...  This document hQs been approved for public release and sale; its distiibution is unlimited.  ...  We also investigated a fast decoding procedure for algebraicgeometric codes, which can correct any L .  ... 
doi:10.1109/43.125100 fatcat:fqosbxl6lzccliutammd27vln4

Design a Low Power and High Speed Parity Checker using Exclusive–or Gates

Brahmaiah Battula, Valeti SaiLakshmi, Karpurapu Sunandha, S. Durga Sri Sravya, Putta Vijaya Lakshmi, S. Navya Sri
2021 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
While correlating the parity checker design with 8T EX-OR and 6T EX-OR, the 6T EX-OR parity checker design gives optimized power, delay, area and PDP over the 8T EX-OR parity checker design.  ...  In the presented paper we designed the parity checker by using EX-OR modules.  ...  And A PC relations based on consolidated generators has been studied and also gave easy formulas for cryptography, finally resulted with successful outcomes.  ... 
doi:10.35940/ijitee.d8522.0210421 fatcat:itbaukt3ofhgxlrj7fopvmvsbu

Automated Verification of Quantum Protocols by Equivalence Checking [article]

Ebrahim Ardeshir-Larijani and Simon J. Gay and Rajagopal Nagarajan
2013 arXiv   pre-print
In this paper we introduce a technique and a tool for formal verification of various quantum information processing protocols.  ...  We also report on experimental results of using our Quantum Equivalence Checker (QEC) to analyse a range of quantum information processing protocols.  ...  Prologue Technologies based on Quantum Information Processing (QIP) are emerging rapidly in our life, from cryptography and communication to fast computation.  ... 
arXiv:1312.5951v1 fatcat:x3xnfdi73jevtencmrnf2rjt7m

Hardware Accelerators for Elliptic Curve Cryptography

C. Puttmann, J. Shokrollahi, M. Porrmann, U. Rückert
2008 Advances in Radio Science  
</strong> In this paper we explore different hardware accelerators for cryptography based on elliptic curves.  ...  Moreover, an FPGA-based rapid prototyping system for fast system verification is presented.  ...  Two independent banks of sixteen 32-bit registers allow fast program context switching, e.g. for fast interrupt handling.  ... 
doi:10.5194/ars-6-259-2008 fatcat:wtzcmzzubbduvfmmydjkglvisq

CT-wasm: type-driven secure cryptography for the web ecosystem

Conrad Watt, John Renner, Natalie Popescu, Sunjay Cauligi, Deian Stefan
2019 Proceedings of the ACM on Programming Languages (PACMPL)  
We find that CT-Wasm is fast, expressive, and generates code that we experimentally measure to be constant-time.  ...  A significant amount of both client and server-side cryptography is implemented in JavaScript.  ...  We thank Dan Gohman for insightful discussions.  ... 
doi:10.1145/3290390 fatcat:s4k7fhddrvdzhgfqkunhojgirm

Novel Framework for Secure Handover Authentication Protocol for 5G Mobile Network

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
(physical layer security) to obtain secure and fast handover in 5G mobile network.  ...  This paper presents a comprehensive solution for secret key generation and user authentication for 5G mobile networks.  ...  AVISPA tool with On-The-Fly Model-Checker (OFMC) model checker, performs protocol falsification and bounded verification.  ... 
doi:10.35940/ijitee.d1881.029420 fatcat:td6nwq44avdcdnuafoefusfgy4

A Verilog Implementation of Modified Advance Encryption Standard for 256 Bit Key

Raghvendra Singh
2020 Zenodo  
Modified-AES algorithm is a fast lightweight encryption algorithm for security of multimedia data. All above advantages make algorithm highly suitable for the input message transfer.  ...  Multimedia data security is achieved by methods of cryptography, which deals with encryption of data.  ...  The extended set ALU with Manchester encoder decoder, Parity Generator, Parity checker, Binary to gray and Gray to Binary convertor is used for enhanced security.  ... 
doi:10.5281/zenodo.4575288 fatcat:xofqpc5x7zhefgaqevcljdpmwe
« Previous Showing results 1 — 15 out of 898 results