期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A Practical SSL Server Performance Improvement Algorithm Based on Batch RSA Decryption 被引量:2
1
作者 李世群 吴永东 +1 位作者 周建英 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期67-70,共4页
The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computationa... The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptions when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and optimizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance, the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b = 4. 展开更多
关键词 batch decryption secure socket layer (SSL) server public key algorithm
下载PDF
CRH Public Encryption - the Study on High Intensity Data Encryption Algorithm 被引量:2
2
作者 LIN Zi, XU Yong, LI Kui-jun (Department of Telecommunication Engineering, Changchun Institute of Posts and Telecommunications, Changchun 130012, P.R. China) 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2000年第1期51-55,共5页
Encrypted Communication technique is an important measure to the information safety. Based on the advantages of two public encryption algorithm RSA & DES, a novel high intensity public encryption algorithm Chaos ... Encrypted Communication technique is an important measure to the information safety. Based on the advantages of two public encryption algorithm RSA & DES, a novel high intensity public encryption algorithm Chaos Random High Intensity (CHR) is proposed in this paper. The principle of CRH is described and analyzed in detail, and the results of computer simulation has proved its effectiveness and correctness. 展开更多
关键词 CHAOS encryption algorithm public encryption algorithm ENCRYPTION
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部