Sciweavers

24188 search results - page 100 / 4838
» Computing on Encrypted Data
Sort
View
FC
2005
Springer
119views Cryptology» more  FC 2005»
15 years 8 months ago
Policy-Based Cryptography and Applications
In this paper, we formulate the concept of policy-based cryptography which makes it possible to perform policy enforcement in large-scale open environments like the Internet, with ...
Walid Bagga, Refik Molva
128
Voted
ICMCS
1999
IEEE
105views Multimedia» more  ICMCS 1999»
15 years 7 months ago
Key Independent Watermark Detection
Many types of pseudo-random signals have been used to embed signatures as watermarks, with spread spectrum signal techniques used to recover the signature from the encrypted data....
Ron G. van Schyndel, Andrew Z. Tirkel, Imants D. S...
SCN
2010
Springer
144views Communications» more  SCN 2010»
15 years 1 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng
145
Voted
FPL
2003
Springer
114views Hardware» more  FPL 2003»
15 years 8 months ago
Power Analysis of FPGAs: How Practical is the Attack?
Recent developments in information technologies made the secure transmission of digital data a critical design point. Large data flows have to be exchanged securely and involve en...
François-Xavier Standaert, Loïc van Ol...
126
Voted
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
15 years 8 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay