Sciweavers

24188 search results - page 143 / 4838
» Computing on Encrypted Data
Sort
View
RECONFIG
2008
IEEE
198views VLSI» more  RECONFIG 2008»
15 years 9 months ago
High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms
– We have implemented in FPGA recently published class of public key algorithms – MQQ, that are based on quasigroup string transformations. Our implementation achieves decrypti...
Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Kna...
ACISP
2008
Springer
15 years 9 months ago
Looking Back at a New Hash Function
Abstract. We present two (related) dedicated hash functions that deliberately borrow heavily from the block ciphers that appeared in the final stages of the AES process. We explor...
Olivier Billet, Matthew J. B. Robshaw, Yannick Seu...
ICMCS
2006
IEEE
119views Multimedia» more  ICMCS 2006»
15 years 9 months ago
Secured MPEG-21 Digital Item Adaptation for H.264 Video
Seamless adaptation and transcoding techniques to adapt the digital content have achieved significant focus to serve the consumers with the desired content in a feasible way. With...
Razib Iqbal, Shervin Shirmohammadi, Abdulmotaleb E...
FOSSACS
2004
Springer
15 years 8 months ago
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols
Abstract. Using a probabilistic polynomial-time process calculus designed for specifying security properties as observational equivalences, we develop a form of bisimulation that j...
Ajith Ramanathan, John C. Mitchell, Andre Scedrov,...
IH
2001
Springer
15 years 7 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn