Sciweavers

45 search results - page 8 / 9
» Cryptography in Quadratic Function Fields
Sort
View
EUROCRYPT
2009
Springer
14 years 6 months ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...
CHES
2009
Springer
200views Cryptology» more  CHES 2009»
14 years 6 months ago
Accelerating AES with Vector Permute Instructions
We demonstrate new techniques to speed up the Rijndael (AES) block cipher using vector permute instructions. Because these techniques avoid data- and key-dependent branches and mem...
Mike Hamburg
PKC
2009
Springer
164views Cryptology» more  PKC 2009»
14 years 6 months ago
Asynchronous Multiparty Computation: Theory and Implementation
Abstract. We propose an asynchronous protocol for general multiparty computation with perfect security and communication complexity O(n2 |C|k) where n is the number of parties, |C|...
Ivan Damgård, Jesper Buus Nielsen, Martin Ge...
SPW
2000
Springer
13 years 9 months ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano
SIAMNUM
2010
126views more  SIAMNUM 2010»
13 years 8 days ago
Smoothing under Diffeomorphic Constraints with Homeomorphic Splines
In this paper we introduce a new class of diffeomorphic smoothers based on general spline smoothing techniques and on the use of some tools that have been recently developed in th...
Jérémie Bigot, Sébastien Gada...