IBM Remote Supervisor Adapter
Semantic Scholar uses AI to extract papers important to this topic.
The latency gap between caches and main memory has been successfully exploited for recovering sensitive input to programs, such… (More)
Wireless networks of miniaturized, low-power sensor/actuator devices are poised to become widely used in commercial and military… (More)
- ACM Trans. Internet Techn.
We present a new approach for fine-grained control over users' security privileges (fast revocation of credentials) centered… (More)
Elliptic Curve Cryptography (ECC) is a relatively new branch of public key cryptography. Its main advantage is that it can… (More)
TLS is the protocol of choice for securing today's e-commerce and online transactions but adding TLS to a Web server imposes a… (More)
We present an algorithmic approach for speeding up SSL’s performance on a web server. Our approach improves the performance of… (More)
In Crypto'99, Bellare and Miner introduced forward-secure signatures as digital signature schemes with the attractive property… (More)
This paper proposes a fast parallel Montgomery multiplication algorithm based on Residue Number Systems (RNS). It is easy to… (More)
This paper describes a new public-key cryptosystem based on the hardness of computing higher residues modulo a composite RSA… (More)
By carefully measuring the amount of time required to perform private key operations, attackers may be able to nd xed Di eHellman… (More)