• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 128,780
Next 10 →

Table 7: Public-key algorithms in mCrypt

in Performance Scaling of Cryptography Operations in Servers and Mobile Clients
by Murat Fiskiran And
"... In PAGE 4: ...1. Workload characteristics We use the SimpleScalar toolset to profile the public- key algorithms included in mCrypt, which are listed in Table7 . Table 8 shows the breakdown of execution times at the macro-operation level.... ..."

Table 8. Number of bits of public key data.

in Unbelievable Security: Matching AES security using public key systems
by Arjen K. Lenstra 2001
Cited by 18

Table 8. Number of bits of public key data.

in Unbelievable Security: Matching AES security using public key systems
by Arjen K. Lenstra 2001
Cited by 18

Table 1 Public key extension services

in A Public Key Extension to the Common Cryptographic Architecture
by A. V. Le, D. B. Johnson, J. D. Wilkins 1993
"... In PAGE 8: ... Furthermore, the services have been designed with orthogonality in mind, so that product im- plementers can select and implement various lev- els or subsets of functionality to meet specific needs of different classes of customers. Table1 provides a categorized listing of the API- callable cryptographic services available in the public key extension, services that are imple- mented in the Transaction Security System. An overview of the services is provided in a later section.... ..."
Cited by 3

Table 2. Applications for Public-key Cryptosystems Algorithm Encryption/Decryption Digital Signature Key Exchange

in A Security Study of Digital TV Distribution Systems
by Nariman Molavi, Xu Zhao, Copyright Nariman Molavi, Xu Zhao 2005
"... In PAGE 8: ...able 1. Type of Attacks on Encrypted Messages ........................................................... 11 Table2 .... In PAGE 22: ...14 Figure 9. Example of Asymmetric Encryption, Encrypting M with KPublic Example of a commonly used asymmetric encryption algorithm is the RSA algorithm, used as an example for key distribution, PKI, digital signatures and other security mechanisms as shown in Table2 . [20] Table 2.... ..."

Table 1. Public key and symmetric key operation overhead.

in Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services
by Feng Zhu, Matt Mutka, Lionel Ni 2003
"... In PAGE 7: ... The cryptography software packages, which we use, come with the development tools. As we see in Table1 , these security operations are fast. The longest operations are the public key operations, which take hundreds of milliseconds.... ..."
Cited by 16

Table 1: Our mechanisms compared with public key equivalents

in Efficient Security Mechanisms for Routing Protocols
by Yih-chun Hu, Adrian Perrig, David B. Johnson 2003
"... In PAGE 12: ... To compare these results to the efficiency of public-key cryptography, we analyzed the functionality provided by each mechanism. A summary of our analysis is shown in Table1 . The tree-authenticated one-way chain essentially provides a signature: given a public key (the root value), private values can be authenticated.... ..."
Cited by 44

Table 1: Our mechanisms compared with public key equivalents

in Efficient Security Mechanisms for Routing Protocols
by Yih-chun Hu 2003
"... In PAGE 12: ... To compare these results to the ef ciency of public-key cryptography, we analyzed the functionality provided by each mechanism. A summary of our analysis is shown in Table1 . The tree-authenticated one-way chain essentially provides a signature: given a public key (the root value), private values can be authenticated.... ..."
Cited by 44

Table 1: Our mechanisms compared with public key equivalents

in Efficient Security Mechanisms for Routing Protocols
by Yih-chun Hu 2003
"... In PAGE 12: ... To compare these results to the ef ciency of public-key cryptography, we analyzed the functionality provided by each mechanism. A summary of our analysis is shown in Table1 . The tree-authenticated one-way chain essentially provides a signature: given a public key (the root value), private values can be authenticated.... ..."
Cited by 44

Table 1: Our mechanisms compared with public key equivalents

in Efficient security mechanisms for routing protocols
by Yih-chun Hu 2003
"... In PAGE 12: ... To compare these results to the efficiency of public-key cryptography, we analyzed the functionality provided by each mechanism. A summary of our analysis is shown in Table1 . The tree-authenticated one-way chain essentially provides a signature: given a public key (the root value), private values can be authenticated.... ..."
Cited by 44
Next 10 →
Results 1 - 10 of 128,780
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University