Sciweavers

1019 search results - page 101 / 204
» Cryptographic Design Vulnerabilities
Sort
View
CCS
2005
ACM
15 years 9 months ago
Applications of secure electronic voting to automated privacy-preserving troubleshooting
Recent work [27, 15] introduced a novel peer-to-peer application that leverages content sharing and aggregation among the peers to diagnose misconfigurations on a desktop PC. Thi...
Qiang Huang, David Jao, Helen J. Wang
128
Voted
FPL
2006
Springer
115views Hardware» more  FPL 2006»
15 years 7 months ago
Executing Hardware as Parallel Software for Picoblaze Networks
Multi-processor architectures have gained interest recently because of their ability to exploit programmable silicon parallelism at acceptable power-efficiency figures. Despite th...
Pengyuan Yu, Patrick Schaumont
123
Voted
CHES
2008
Springer
128views Cryptology» more  CHES 2008»
15 years 6 months ago
Hash Functions and RFID Tags: Mind the Gap
Abstract. The security challenges posed by RFID-tag deployments are wellknown. In response there is a rich literature on new cryptographic protocols and an on-tag hash function is ...
Andrey Bogdanov, Gregor Leander, Christof Paar, Ax...
131
Voted
CSREAESA
2006
15 years 5 months ago
Power Optimization of Interconnection Networks for Transport Triggered Architecture
Transport triggered architecture (TTA) has been shown to provide an efficient way to design application specific instruction set processors. However, the interconnection network of...
Xue-mi Zhao, Zhiying Wang
ECIS
2001
15 years 5 months ago
Web Security: The Emperor's New Armour
The World Wide Web originally provided no security services because it was not designed to support sensitive applications. As the Web evolved to become a platform for all types of...
Audun Jøsang, Peter M. Møllerud, Edd...