Sciweavers

1825 search results - page 93 / 365
» Cryptographic Securities Exchanges
Sort
View
119
Voted
CRYPTO
2010
Springer
151views Cryptology» more  CRYPTO 2010»
15 years 4 months ago
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
Abstract. A cryptographic primitive is leakage-resilient, if it remains secure even if an adversary can learn a bounded amount of arbitrary information about the computation with e...
Yevgeniy Dodis, Krzysztof Pietrzak
141
Voted
IEEEARES
2008
IEEE
15 years 10 months ago
Context Ontology for Secure Interoperability
During interoperability exchanges, organizations are jointly conducting computation and sharing tasks. However, organizations can have different security policies. To guarantee g...
Céline Coma, Nora Cuppens-Boulahia, Fr&eacu...
145
Voted
ICALP
2007
Springer
15 years 5 months ago
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...
Aggelos Kiayias, Hong-Sheng Zhou
126
Voted
CORR
2010
Springer
99views Education» more  CORR 2010»
15 years 3 months ago
INDECT Advanced Security Requirements
This paper reviews the requirements for the security mechanisms that are currently being developed in the framework of the European research project INDECT. An overview of features...
Manuel Urueña, Petr Machnik, Maria Martinez...
151
Voted
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 10 months ago
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
We enrich the classical notion of group key exchange (GKE) protocols by a new property that allows each pair of users to derive an independent peer-to-peer (p2p) key on-demand and ...
Mark Manulis