### Table 1: Relationship between Pseudo-Free Groups and Cryptographic Problems.

2007

### Table 1. Notation for cryptographic expres- sions

"... In PAGE 7: ... This threat can only be avoided by using an additional encryption mecha- nism for transmitting these certificates. We address this problem by enhancing the UML model by cryptographic functions given in Table1 for producing a protocol for secure communication between the objects fol- lowing [7]. The security check for this protocol is done au- tomatically using the first-order predicate logic automated theorem prover e-Setheo.... In PAGE 7: ... In Figure 4, the corresponding sequence diagram is shown. The notation for cryptographic expressions used in this diagram is given in Table1 . For better readability, the messages contain names of functions (such as subscribe or conf), indicating their purpose.... ..."

### Table 1: Cryptographic Costs

2004

"... In PAGE 3: ...costs1 are given in Table1 . The table provides signa- ture and veri cation times for RSA on 10 bytes with exponents of 3, 17, and 65537 as well as SHA hashes on 10 and 1460 bytes.... In PAGE 11: ...02 second per TG. This is about 1% of the processor time, which is close to what would be predicted by Figure 7(a) and Table1 . Figure 7(c) shows that the authentication loss is between 2% and 3% and is not much a ected by the attack.... ..."

Cited by 10

### Table 1- Cryptographic Notation

"... In PAGE 13: ...Table1... ..."

### Table 2. Subgroup Membership Problems

2001

"... In PAGE 7: ... For other plausible applications of the subgroup membership problem, the reader is also referred to [12] in which the DDH assumption is applied to the cryptographic schemes which only known method to construct is to base on the QR assumption. We summarize the examples above in Table2 , however, the table is not exhaustive at all. Table 2.... ..."

Cited by 6

### Table I. Speeds of Cryptographic Operations

1992

Cited by 368

### Table 1: Cryptographic Algorithm Choices

1999

"... In PAGE 9: ... The iSpaceFor- warder is part of the infrastructure, however, which means it apos;s part of the trusted code base regardless. Table1 shows the cryptographic algorithms used for the various components and their associated param- eters. Our design does not rely on any of the algo- rithm choices.... ..."

Cited by 232

### Table 2: Timings of cryptographic routines

1999

"... In PAGE 11: ...Table 2: Timings of cryptographic routines routines and placed the results in Table2 . We should point out we used a 1 KB input size for encryp- tion/decryption for both RSA and 3DES.... ..."

Cited by 232