Providing strong security margins against cryptanalytic attackers equipped with quantum computers is a major research direction fostered by the US National Institute of Standards …
We develop a new methodology to assess cryptographic key strength using cloud computing, by calculating the true economic cost of (symmetric-or private-) key retrieval for …
M Yasuda, T Shimoyama, J Kogure, T Izu - Applicable Algebra in …, 2016 - Springer
The RSA cryptosystem and elliptic curve cryptography (ECC) have been used practically and widely in public key cryptography. The security of RSA and ECC respectively relies on …
A resources allocation is one of the most important things in cloud computing because the environment in which work depends is heterogeneous environment and there are many who …
M Yasuda, T Shimoyama, J Kogure, T Izu - Security and Cryptography for …, 2012 - Springer
At present, the RSA cryptosystem is most widely used in public key cryptography. On the other hand, elliptic curve cryptography (ECC) has recently received much attention since …
M Delcourt, T Kleinjung, AK Lenstra, S Nath… - Cryptology ePrint …, 2018 - eprint.iacr.org
We develop a new methodology to assess cryptographic key strength using cloud computing, by calculating the true economic cost of (symmetric-or private-) key retrieval for …
Quantum computing is widely seen as an evolution step in computer science, with the potential for disruptive changes in how we think about problem solvability. The significant …
Software often contains proprietary information---algorithms, intellectual property, and encryption keys, for example---which malicious actors seek to access through reverse …
B Schmidt, H Aribowo, HV Dang - Euro-Par 2011 Parallel Processing: 17th …, 2011 - Springer
Abstract The Block Wiedemann (BW) and the Block Lanczos (BL) algorithms are frequently used to solve sparse linear systems over GF (2). Iterative sparse matrix-vector multiplication …