### Table 7: Public-key algorithms in mCrypt

"... In PAGE 4: ...1. Workload characteristics We use the SimpleScalar toolset to profile the public- key algorithms included in mCrypt, which are listed in Table7 . Table 8 shows the breakdown of execution times at the macro-operation level.... ..."

### Table 8. Number of bits of public key data.

2001

Cited by 18

### Table 8. Number of bits of public key data.

2001

Cited by 18

### Table 1 Public key extension services

1993

"... In PAGE 8: ... Furthermore, the services have been designed with orthogonality in mind, so that product im- plementers can select and implement various lev- els or subsets of functionality to meet specific needs of different classes of customers. Table1 provides a categorized listing of the API- callable cryptographic services available in the public key extension, services that are imple- mented in the Transaction Security System. An overview of the services is provided in a later section.... ..."

Cited by 3

### Table 2. Applications for Public-key Cryptosystems Algorithm Encryption/Decryption Digital Signature Key Exchange

2005

"... In PAGE 8: ...able 1. Type of Attacks on Encrypted Messages ........................................................... 11 Table2 .... In PAGE 22: ...14 Figure 9. Example of Asymmetric Encryption, Encrypting M with KPublic Example of a commonly used asymmetric encryption algorithm is the RSA algorithm, used as an example for key distribution, PKI, digital signatures and other security mechanisms as shown in Table2 . [20] Table 2.... ..."

### Table 1. Public key and symmetric key operation overhead.

2003

"... In PAGE 7: ... The cryptography software packages, which we use, come with the development tools. As we see in Table1 , these security operations are fast. The longest operations are the public key operations, which take hundreds of milliseconds.... ..."

Cited by 16

### Table 1: Our mechanisms compared with public key equivalents

2003

"... In PAGE 12: ... To compare these results to the efficiency of public-key cryptography, we analyzed the functionality provided by each mechanism. A summary of our analysis is shown in Table1 . The tree-authenticated one-way chain essentially provides a signature: given a public key (the root value), private values can be authenticated.... ..."

Cited by 44

### Table 1: Our mechanisms compared with public key equivalents

2003

"... In PAGE 12: ... To compare these results to the ef ciency of public-key cryptography, we analyzed the functionality provided by each mechanism. A summary of our analysis is shown in Table1 . The tree-authenticated one-way chain essentially provides a signature: given a public key (the root value), private values can be authenticated.... ..."

Cited by 44

### Table 1: Our mechanisms compared with public key equivalents

2003

"... In PAGE 12: ... To compare these results to the ef ciency of public-key cryptography, we analyzed the functionality provided by each mechanism. A summary of our analysis is shown in Table1 . The tree-authenticated one-way chain essentially provides a signature: given a public key (the root value), private values can be authenticated.... ..."

Cited by 44

### Table 1: Our mechanisms compared with public key equivalents

2003

"... In PAGE 12: ... To compare these results to the efficiency of public-key cryptography, we analyzed the functionality provided by each mechanism. A summary of our analysis is shown in Table1 . The tree-authenticated one-way chain essentially provides a signature: given a public key (the root value), private values can be authenticated.... ..."

Cited by 44