Computer Engineering / Bilgisayar Mühendisliği

Permanent URI for this collectionhttps://hdl.handle.net/11147/10

Browse

Search Results

Now showing 1 - 4 of 4
  • Conference Object
    Citation - Scopus: 4
    Test Case Generation for Firewall Implementation Testing Using Software Testing Techniques
    (Tafford Publishing, 2008) Tuğlular, Tuğkan
    The firewall implementation testing approach checks actions performed by the firewall with respect to corresponding firewall rules. This type of firewall testing can be implemented by developing test cases from firewall rule sequence, generating test packets using those test cases and injecting those test packets into the firewall. Although this method has been already defined in the academic world, an approach to generate test cases does not exist in the literature. In this work, a test case generation approach is developed using software testing techniques. © 2008 Atilla Elçi.
  • Conference Object
    The Performance Results of Ecdsa Implementation on Different Coordinate Systems
    (Tafford Publishing, 2008) Atay, Serap
    Elliptic Curve Cryptography has a high computational cost due to arithmetic operations of point addition and point doubling. But the cost can be reduced if different coordinate systems utilized. This paper shows that the performance of an elliptic curve digital signature algorithm (ECDSA) can be significantly increased by using different coordinate systems.
  • Conference Object
    On Ntru and Its Performance
    (Tafford Publishing, 2008) Mersin, Ali; Beyazıt, Mutlu
    Hardness of lattice problems has introduced a new candidate for public key cryptosystems. NTRU is one of such cryptosystems. The fact that it works with small integers and that the complexities of key generation, encryption and decryption are relatively small leads to good overall performance when compared to the other public key cryptosystems. The aim of this study is to make a theoretical to practical introduction to NTRU and investigate how it performs against popular public key cryptosystems such as RSA and, especially, ECC. © 2008 Atilla Elçi.
  • Conference Object
    A Memory Management Model for Cryptographic Software Libraries
    (Tafford Publishing, 2008) Mersin, Ali; Beyazıt, Mutlu
    Cryptographic protocols are implemented on the abstraction of multiple precision number libraries in which the dominant design criterion mostly turns out to be the maximization of the system performance. In contrast, each protocol may have its own memory usage pattern. In general case, the memory allocation and release routines are frequently called during the runtime. For this reason, an improper memory management strategy may yield an inefficient implementation. In this paper, we propose a memory management technique which is constructed under the consideration of the context of high level cryptographic software running on multi-programmed environments. Also, we show the implementation results of our approach and discuss with respect to the common static and dynamic memory allocation strategies. © 2008 Atilla Elçi.