A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is
Advances in Cryptology-CRYPT0' 90
O n the other hand, the price for increased confidence is increased computation, making fast checkers especially attractive. . . . for Cryptography If the average user is concerned about program correctness ... run much faster than any program for x ; such a checker will be called fast. ... Output 'CORRECT.' e n d Open Problems An important open problem is whether there exists a constant-query checker for modular exponentiation. Such a checker could prove useful in cryptography. ...doi:10.1007/3-540-38424-3_36 dblp:conf/crypto/KompellaA90 fatcat:42357gcl55afjnlpladllz5ktq
Lecture Notes in Computer Science
We introduce the relationship between incremental cryptography and memory checkers. ... From this scheme we derive memory checkers for data structures based on lists. ... Acknowledgements We thank Roger Fischlin for pointing out the topic of memory checkers and C.P. Schnorr and the anonymous referees for their comments. ...doi:10.1007/3-540-69053-0_27 fatcat:532uwhnkdrhklfn6mwua4kltfi
We find surprisingly fast batch verifiers for this relation. We also find efficient batch verifiers for the degrees of polynomials. ... ISBN 0-444-82873-7 This is a cryptography book which focuses on methods for produc- ing keystream sequences for stream ciphers. ...
From the security issues, we propose a novel intermediary situated information transferring and remote information honesty checking model in identity-based public key cryptography: identity-based proxy-oriented ... Introduction Along with the fast improvement of processing and correspondence system, a lot of information is produced. ... Sometimes, the cryptographic operation will be designated to the outsider, for instance intermediary. Along these lines, we need to utilize the intermediary cryptography. ...doi:10.21742/ijria.2013.1.1.04 fatcat:jdjpnhyvhvgnvpsmrhzbzyloli
Lecture Notes in Computer Science
We review the need for crypto-integrity in various known settings, ways to implement it based on known protocol techniques as well as potential future directions. ... In this setting, given arbitrary input α and program P , a checker C for a function f will catch, with high probability, if P (α) = f (α). ... Introduction Integrity assurance is a part of many modern cryptography constructions. ...doi:10.1007/3-540-36178-2_35 fatcat:w4ydprherzawlc3zynft2sr7ve
From the security problems we propose "A NOVEL APPROACH FOR DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING BASED ON PUBLIC KEY CRYPTOGRAPHY" (ANDURIC-PKC). ... INTRODUCTION Along with the fast development of computing and communication technique, an excellent deal of information area unit generated. ... cryptography. . ...doi:10.24001/ijaems.3.4.9 fatcat:xz2zox4fc5bi3fvynbmrw7lggy
for cryptosystems defined over Fy (379-392); Marc Fischlin, Incremental cryptography and memory checkers (393-408); Kaoru Kurosawa, Thomas Johansson and Douglas Stinson, Almost k-wise independent sample ... : us- ing cryptography against cryptography (62-74); Ronald Cramer and Ivan Damgard, Fast and secure immunization against adaptive man-in-the-middle impersonation (75-87); Birgit Pfitzmann and Michael ...
Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007)
fast designs in Suitable for fast designs in slower systems slower systems DDR DDR 13% 13% 77% 77% Non Non--linear scalable linear scalable cubic network cubic network Non Non--linear ... : elements of the partitions are interleaved both in By checkers: elements of the partitions are interleaved both in columns columns and rows, like a chess board and rows, like a chess boardData Alignment ...doi:10.1109/fdtc.2007.1 fatcat:hukyi5b2uzephiezszph6267he
It should be mentioned that TSC checkers actually are all TSC and CD combinational circuits. Therefore, the TSC checkers using PLA can be obtained by this design method. ... This document hQs been approved for public release and sale; its distiibution is unlimited. ... We also investigated a fast decoding procedure for algebraicgeometric codes, which can correct any L . ...doi:10.1109/43.125100 fatcat:fqosbxl6lzccliutammd27vln4
While correlating the parity checker design with 8T EX-OR and 6T EX-OR, the 6T EX-OR parity checker design gives optimized power, delay, area and PDP over the 8T EX-OR parity checker design. ... In the presented paper we designed the parity checker by using EX-OR modules. ... And A PC relations based on consolidated generators has been studied and also gave easy formulas for cryptography, finally resulted with successful outcomes. ...doi:10.35940/ijitee.d8522.0210421 fatcat:itbaukt3ofhgxlrj7fopvmvsbu
In this paper we introduce a technique and a tool for formal verification of various quantum information processing protocols. ... We also report on experimental results of using our Quantum Equivalence Checker (QEC) to analyse a range of quantum information processing protocols. ... Prologue Technologies based on Quantum Information Processing (QIP) are emerging rapidly in our life, from cryptography and communication to fast computation. ...arXiv:1312.5951v1 fatcat:x3xnfdi73jevtencmrnf2rjt7m
</strong> In this paper we explore different hardware accelerators for cryptography based on elliptic curves. ... Moreover, an FPGA-based rapid prototyping system for fast system verification is presented. ... Two independent banks of sixteen 32-bit registers allow fast program context switching, e.g. for fast interrupt handling. ...doi:10.5194/ars-6-259-2008 fatcat:wtzcmzzubbduvfmmydjkglvisq
(physical layer security) to obtain secure and fast handover in 5G mobile network. ... This paper presents a comprehensive solution for secret key generation and user authentication for 5G mobile networks. ... AVISPA tool with On-The-Fly Model-Checker (OFMC) model checker, performs protocol falsification and bounded verification. ...doi:10.35940/ijitee.d1881.029420 fatcat:td6nwq44avdcdnuafoefusfgy4
Modified-AES algorithm is a fast lightweight encryption algorithm for security of multimedia data. All above advantages make algorithm highly suitable for the input message transfer. ... Multimedia data security is achieved by methods of cryptography, which deals with encryption of data. ... The extended set ALU with Manchester encoder decoder, Parity Generator, Parity checker, Binary to gray and Gray to Binary convertor is used for enhanced security. ...doi:10.5281/zenodo.4575288 fatcat:xofqpc5x7zhefgaqevcljdpmwe
« Previous Showing results 1 — 15 out of 898 results