Sciweavers

30 search results - page 6 / 6
» Blockcipher-Based Hashing Revisited
Sort
View
ICN
2009
Springer
13 years 12 months ago
Distributed Information Object Resolution
The established host-centric networking paradigm is challenged due to handicaps related with disconnected operation, mobility, and broken locator/identifier semantics. This paper...
Kostas Pentikousis
PKC
2010
Springer
187views Cryptology» more  PKC 2010»
13 years 7 months ago
Confidential Signatures and Deterministic Signcryption
Encrypt-and-sign, where one encrypts and signs a message in parallel, is usually not recommended for confidential message transmission. The reason is that the signature typically l...
Alexander W. Dent, Marc Fischlin, Mark Manulis, Ma...
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
13 years 12 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
CGF
2008
150views more  CGF 2008»
13 years 5 months ago
Compact, Fast and Robust Grids for Ray Tracing
The focus of research in acceleration structures for ray tracing recently shifted from render time to time to image, the sum of build time and render time, and also the memory foo...
Ares Lagae, Philip Dutré
SIGMETRICS
2008
ACM
181views Hardware» more  SIGMETRICS 2008»
13 years 5 months ago
Counter braids: a novel counter architecture for per-flow measurement
Fine-grained network measurement requires routers and switches to update large arrays of counters at very high link speed (e.g. 40 Gbps). A naive algorithm needs an infeasible amo...
Yi Lu, Andrea Montanari, Balaji Prabhakar, Sarang ...