### Table 2. Measurements of Computation Delay in RSA cryptosystem

2002

"... In PAGE 9: ...We use RSA cryptographic primitives to realize the public key cryptosystem in our design. The result shown in Table2 illustrates the performance of RSA cryptosystem are not prohibitively expensive even for the low-end device. Thus leveraging PKI-based ap- proaches into wireless ad-hoc networks is an accept- able solution.... ..."

Cited by 27

### Table 2. Measurements of Computation Delay in RSA cryptosystem

2002

"... In PAGE 9: ...We use RSA cryptographic primitives to realize the public key cryptosystem in our design. The result shown in Table2 illustrates the performance of RSA cryptosys- tem are not prohibitively expensive even for the low- end device. Thus leveraging PKI-based approaches into wireless ad-hoc networks is an acceptable solution.... ..."

Cited by 27

### Table 4.2: Measurements of Computation Delay in RSA cryptosystem

### Table 7.4: Average Run Times for the NICE, the REAL-NICE(N), the REAL-NICE(IMS), and the RSA Cryptosystem With Small Block Lengths.

2004

### Table 4.1: Average timings for the Nk cryptosystem compared to RSA cryptosystem with a 1024-bit modulus n and e = 216 + 1 for over 1000 randomly chosen pairs of primes of the speci ed size on a Celeron 500 MHz using the LiDIA library

### Table 4-2: Performance on PC Cryptosystem PMI+ RSA PMI+ RSA Block Size 80bit 1024 bit 96 bit 2048 bit

in Contents

"... In PAGE 13: ...able 2-1: The security strength of PMI+ ........................................................................... 12 Table4 -1: Requirements of memory .... In PAGE 13: ...able 4-1: Requirements of memory ................................................................................... 24 Table4 -2: Performance on PC.... In PAGE 13: ...able 4-2: Performance on PC............................................................................................. 25 Table4 -3: Comparison with RSA .... In PAGE 38: ...8K 89 182 3.1K Table4 -1: Requirements of memory ... In PAGE 39: ...0 86.99 Security ECC-160 ECC-160 ECC-224 ECC-224 Table4 -3: Comparison with RSA We not only measured the performance on PC, but also on two Intel 8051 CPU based components: Intel 8052AH and Dollars DS80C320 component without crypto coprocessor. The timing of each environment as follows.... In PAGE 39: ....4 7.0 8.0 Table4... ..."

### Table 3: Time-Line of Partial Key-Exposure Attacks on RSA and RSA-like cryptosystems. The top half of the table corresponds to attacks with known most significant bits. The bottom half of the table corresponds to attacks with known least significant bits. It is assumed that all primes are balanced.

2004

"... In PAGE 61: ... We leave the details to [58]. Time-Line In Table3 , we present a time-line of partial key-exposure at- tacks on RSA and RSA-like systems that use lattice basis reduction. 4.... ..."