Sciweavers

24529 search results - page 416 / 4906
» Computing on Authenticated Data
Sort
View
251
Voted
ASPLOS
2009
ACM
16 years 5 months ago
Complete information flow tracking from the gates up
For many mission-critical tasks, tight guarantees on the flow of information are desirable, for example, when handling important cryptographic keys or sensitive financial data. We...
Mohit Tiwari, Hassan M. G. Wassel, Bita Mazloom, S...
126
Voted
PKC
2009
Springer
126views Cryptology» more  PKC 2009»
16 years 5 months ago
Signing a Linear Subspace: Signature Schemes for Network Coding
Network coding offers increased throughput and improved robustness to random faults in completely decentralized networks. In contrast to traditional routing schemes, however, netw...
Dan Boneh, David Freeman, Jonathan Katz, Brent Wat...
ICIP
2007
IEEE
15 years 11 months ago
Rotation-Independent IRIS Matching by Motion Estimation
In this paper we propose a novel method of applying motion estimation techniques to human authentication by iris matching. By exploiting the inherent differences in vector fields ...
Donald M. Monro, Soumyadip Rakshit
CHES
2007
Springer
154views Cryptology» more  CHES 2007»
15 years 11 months ago
Multi-gigabit GCM-AES Architecture Optimized for FPGAs
Abstract. This paper presents a design-space exploration of the Galois/Counter Mode (GCM) algorithm with Advanced Encryption Standard (AES) as underlying block cipher for high thro...
Stefan Lemsitzer, Johannes Wolkerstorfer, Norbert ...
ISI
2007
Springer
15 years 11 months ago
Using Digital Chains of Custody on Constrained Devices to Verify Evidence
—A digital chain of custody is an account documenting digital data at a particular place and time. This paper gives a method of validating and authenticating a digital chain of c...
Phillip G. Bradford, Daniel A. Ray