Sciweavers

352 search results - page 1 / 71
» Cryptography in the Multi-string Model
Sort
View
ASIACRYPT
2011
Springer
12 years 4 months ago
Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge
A fundamental question in cryptography deals with understanding the role that randomness plays in cryptographic protocols and to what extent it is necessary. One particular line o...
Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, A...
INFORMATICALT
2010
170views more  INFORMATICALT 2010»
13 years 2 months ago
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original sign...
Hu Xiong, Fagen Li, Zhiguang Qin
ACSAC
2001
IEEE
13 years 8 months ago
A JCA-Based Implementation Framework for Threshold Cryptography
The Java Cryptography Architecture, JCA in short, was created to allow JCA-compliant cryptography providers to be plugged into a JCA-aware application at run time. This configurab...
Yih Huang, David Rine, Xunhua Wang
CHES
2007
Springer
131views Cryptology» more  CHES 2007»
13 years 11 months ago
Gaussian Mixture Models for Higher-Order Side Channel Analysis
Kerstin Lemke-Rust, Christof Paar
FSE
2007
Springer
140views Cryptology» more  FSE 2007»
13 years 11 months ago
An Analytical Model for Time-Driven Cache Attacks
Kris Tiri, Onur Aciiçmez, Michael Neve, Fle...