Sciweavers

24188 search results - page 152 / 4838
» Computing on Encrypted Data
Sort
View
CSFW
2003
IEEE
15 years 8 months ago
Type-Based Distributed Access Control
A type system is presented that combines a weak form of information flow control, termed distributed access control in the paper, with typed cryptographic operations. The motivat...
Tom Chothia, Dominic Duggan, Jan Vitek
WICON
2008
15 years 4 months ago
Using the EAP framework for fast media independent handover authentication
In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover: namely, re-authentication a...
Antonio Izquierdo, Nada Golmie, Katrin Hoeper, Lid...
JOT
2006
104views more  JOT 2006»
15 years 3 months ago
Call-out Bracket Methods in Timor
This paper extends the concept of qualifying types by describing how their implementations can include not only bracket methods which are applied when a method of a target object ...
James Leslie Keedy, Klaus Espenlaub, Christian Hei...
IACR
2011
205views more  IACR 2011»
14 years 2 months ago
Biclique Cryptanalysis of the Block Cipher SQUARE
Abstract. SQUARE, an 8-round substitution-permutation block cipher, is considered as the predecessor of the AES. In this paper, inspired from the recent biclique attack on the AES ...
Hamid Mala
CRYPTO
2004
Springer
120views Cryptology» more  CRYPTO 2004»
15 years 8 months ago
Round-Optimal Secure Two-Party Computation
Abstract. We consider the central cryptographic task of secure twoparty computation, where two parties wish to compute some function of their private inputs (each receiving possibl...
Jonathan Katz, Rafail Ostrovsky