VLSI IMPLEMENTATION OF PUBLIC-KEY ENCRYPTION ALGORITHMS

被引:0
|
作者
ORTON, GA [1 ]
ROY, MP [1 ]
SCOTT, PA [1 ]
PEPPARD, LE [1 ]
TAVARES, SE [1 ]
机构
[1] BELL NO RES,OTTAWA K1Y 4H7,ONTARIO,CANADA
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:277 / 301
页数:25
相关论文
共 50 条
  • [41] Public-Key Encryption Schemes with Auxiliary Inputs
    Dodis, Yevgeniy
    Goldwasser, Shafi
    Kalai, Yael Tauman
    Peikert, Chris
    Vaikuntanathan, Vinod
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2010, 5978 : 361 - +
  • [42] Password-Authenticated Public-Key Encryption
    Bradley, Tatiana
    Camenisch, Jan
    Jarecki, Stanislaw
    Lehmann, Anja
    Neven, Gregory
    Xu, Jiayu
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 442 - 462
  • [43] Intrusion-resilient public-key encryption
    Dodis, Y
    Franklin, M
    Katz, J
    Miyaji, A
    Yung, M
    TOPICS IN CRYPTOLOGY - CT-RSA 2003, PROCEEDINGS, 2003, 2612 : 19 - 32
  • [44] On the Power of Public-Key Encryption in Secure Computation
    Mahmoody, Mohammad
    Maji, Hemanta K.
    Prabhakaran, Manoj
    THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 240 - 264
  • [45] Public-key encryption and authentication of quantum information
    LIANG Min 1
    2 Graduate University of Chinese Academy of Sciences
    Science China(Physics,Mechanics & Astronomy), 2012, (09) : 1618 - 1629
  • [46] On the security notions for public-key encryption schemes
    Phan, DH
    Pointcheval, D
    SECURITY IN COMMUNICATION NETWORKS, 2005, 3352 : 33 - 46
  • [47] Tightly secure signatures and public-key encryption
    Dennis Hofheinz
    Tibor Jager
    Designs, Codes and Cryptography, 2016, 80 : 29 - 61
  • [48] Optimizing public-key encryption for wireless clients
    Potlapally, NR
    Ravi, S
    Raghunathan, A
    Lakshminarayana, G
    2002 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2002, : 1050 - 1056
  • [49] A research on new public-key encryption schemes
    Jiang, ZT
    Xiang, MS
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 51 - 61
  • [50] Public-key encryption and authentication of quantum information
    Min Liang
    Li Yang
    Science China Physics, Mechanics and Astronomy, 2012, 55 : 1618 - 1629