Sciweavers

1019 search results - page 69 / 204
» Cryptographic Design Vulnerabilities
Sort
View
STOC
1995
ACM
107views Algorithms» more  STOC 1995»
15 years 7 months ago
Incremental cryptography and application to virus protection
The goal of incremental cryptography is to design cryptographic algorithms with the property that having applied the algorithm to a document, it is possible to quickly update the ...
Mihir Bellare, Oded Goldreich, Shafi Goldwasser
CCS
2008
ACM
15 years 6 months ago
Towards practical biometric key generation with randomized biometric templates
Although biometrics have garnered significant interest as a source of entropy for cryptographic key generation, recent studies indicate that many biometric modalities may not actu...
Lucas Ballard, Seny Kamara, Fabian Monrose, Michae...
122
Voted
ICFP
2008
ACM
16 years 3 months ago
The power of Pi
This paper exhibits the power of programming with dependent types by dint of embedding three domain-specific languages: Cryptol, a language for cryptographic protocols; a small da...
Nicolas Oury, Wouter Swierstra
ICALP
2007
Springer
15 years 5 months ago
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...
Aggelos Kiayias, Hong-Sheng Zhou
FCCM
2003
IEEE
123views VLSI» more  FCCM 2003»
15 years 9 months ago
FPGA-based SIMD Processor
A massively parallel single instruction multiple data stream (SIMD) processor designed specifically for cryptographic key search applications is presented. This design aims to ex...
Stanley Y. C. Li, Gap C. K. Cheuk, Kin-Hong Lee, P...