Results 1 - 10
of
128,780
Table 7: Public-key algorithms in mCrypt
"... In PAGE 4: ...1. Workload characteristics We use the SimpleScalar toolset to profile the public- key algorithms included in mCrypt, which are listed in Table7 . Table 8 shows the breakdown of execution times at the macro-operation level.... ..."
Table 8. Number of bits of public key data.
2001
Cited by 18
Table 8. Number of bits of public key data.
2001
Cited by 18
Table 1 Public key extension services
1993
"... In PAGE 8: ... Furthermore, the services have been designed with orthogonality in mind, so that product im- plementers can select and implement various lev- els or subsets of functionality to meet specific needs of different classes of customers. Table1 provides a categorized listing of the API- callable cryptographic services available in the public key extension, services that are imple- mented in the Transaction Security System. An overview of the services is provided in a later section.... ..."
Cited by 3
Table 2. Applications for Public-key Cryptosystems Algorithm Encryption/Decryption Digital Signature Key Exchange
2005
"... In PAGE 8: ...able 1. Type of Attacks on Encrypted Messages ........................................................... 11 Table2 .... In PAGE 22: ...14 Figure 9. Example of Asymmetric Encryption, Encrypting M with KPublic Example of a commonly used asymmetric encryption algorithm is the RSA algorithm, used as an example for key distribution, PKI, digital signatures and other security mechanisms as shown in Table2 . [20] Table 2.... ..."
Table 1. Public key and symmetric key operation overhead.
2003
"... In PAGE 7: ... The cryptography software packages, which we use, come with the development tools. As we see in Table1 , these security operations are fast. The longest operations are the public key operations, which take hundreds of milliseconds.... ..."
Cited by 16
Table 1: Our mechanisms compared with public key equivalents
2003
"... In PAGE 12: ... To compare these results to the efficiency of public-key cryptography, we analyzed the functionality provided by each mechanism. A summary of our analysis is shown in Table1 . The tree-authenticated one-way chain essentially provides a signature: given a public key (the root value), private values can be authenticated.... ..."
Cited by 44
Table 1: Our mechanisms compared with public key equivalents
2003
"... In PAGE 12: ... To compare these results to the ef ciency of public-key cryptography, we analyzed the functionality provided by each mechanism. A summary of our analysis is shown in Table1 . The tree-authenticated one-way chain essentially provides a signature: given a public key (the root value), private values can be authenticated.... ..."
Cited by 44
Table 1: Our mechanisms compared with public key equivalents
2003
"... In PAGE 12: ... To compare these results to the ef ciency of public-key cryptography, we analyzed the functionality provided by each mechanism. A summary of our analysis is shown in Table1 . The tree-authenticated one-way chain essentially provides a signature: given a public key (the root value), private values can be authenticated.... ..."
Cited by 44
Table 1: Our mechanisms compared with public key equivalents
2003
"... In PAGE 12: ... To compare these results to the efficiency of public-key cryptography, we analyzed the functionality provided by each mechanism. A summary of our analysis is shown in Table1 . The tree-authenticated one-way chain essentially provides a signature: given a public key (the root value), private values can be authenticated.... ..."
Cited by 44
Results 1 - 10
of
128,780