Learn More
This paper shows that a $390 mass-market quad-core 2.4GHz Intel Westmere (Xeon E5620) CPU can create 109000 signatures per second and verify 71000 signatures per second on an elliptic curve at a 2128 security level. Public keys are 32 bytes, and signatures are 64 bytes. These performance figures include strong defenses against software side-channel attacks:(More)
The authors automated the selection of foods in a computer system that compiles and processes tailored FFQ. For the selection of food items, several methods are available. The aim of the present study was to compare food lists made by MOM2, which identifies food items with highest between-person variance in intake of the nutrients of interest without taking(More)
DNS, Domain Name System is a protocol that resolves hostnames to IP Addresses over the Internet. DNS, being an open source, it is less secure and it has no means of determining whether domain name data comes from an authorised domain owner. So, these vulnerabilities lead to a number of attacks, such as, cache poisoning, cache spoofing etc. Hence, there is a(More)
Bitcoin[1] currently utilizes the Elliptic Curve Digital Signature Algorithm (ECDSA)[8] as a zero-knowledge proof of ownership[10] in order to authorize the transfer of Satoshis[14] from one output to another. ECDSA applied to cryptocurrency has its share of short comings, namely: signature malleability can invalidate unconfirmed transaction chains[16, 13],(More)
  • 1