Sciweavers

356 search results - page 2 / 72
» Cryptography in the Bounded-Quantum-Storage Model
Sort
View
IACR
2011
73views more  IACR 2011»
12 years 5 months ago
Secure Authentication from a Weak Key, Without Leaking Information
We study the problem of authentication based on a weak key in the information-theoretic setting. A key is weak if its min-entropy is an arbitrary small fraction of its bit length. ...
Niek J. Bouman, Serge Fehr
INFORMATICALT
2010
170views more  INFORMATICALT 2010»
13 years 2 months ago
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original sign...
Hu Xiong, Fagen Li, Zhiguang Qin
ACSAC
2001
IEEE
13 years 9 months ago
A JCA-Based Implementation Framework for Threshold Cryptography
The Java Cryptography Architecture, JCA in short, was created to allow JCA-compliant cryptography providers to be plugged into a JCA-aware application at run time. This configurab...
Yih Huang, David Rine, Xunhua Wang
CHES
2007
Springer
131views Cryptology» more  CHES 2007»
13 years 11 months ago
Gaussian Mixture Models for Higher-Order Side Channel Analysis
Kerstin Lemke-Rust, Christof Paar
FSE
2007
Springer
140views Cryptology» more  FSE 2007»
13 years 11 months ago
An Analytical Model for Time-Driven Cache Attacks
Kris Tiri, Onur Aciiçmez, Michael Neve, Fle...