Sciweavers

2432 search results - page 131 / 487
» Cryptographic logical relations
Sort
View
121
Voted
DLOG
2011
14 years 4 months ago
Concept Model Semantics for DL Preferential Reasoning
Abstract. The preferential and rational consequence relations first studied by Lehmann and colleagues play a central role in non-monotonic reasoning, not least because they provid...
Arina Britz, Thomas Meyer, Ivan José Varzin...
PROVSEC
2009
Springer
15 years 7 months ago
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
Signcryption is a cryptographic primitive that provides authentication and confidentiality simultaneously in a single logical step. It is often required that multiple senders have...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
95
Voted
CHES
2005
Springer
82views Cryptology» more  CHES 2005»
15 years 6 months ago
Masking at Gate Level in the Presence of Glitches
Abstract. It has recently been shown that logic circuits in the implementation of cryptographic algorithms, although protected by “secure” random masking schemes, leak side-cha...
Wieland Fischer, Berndt M. Gammel
LICS
2010
IEEE
14 years 11 months ago
Weak Equivalences in Psi-Calculi
Psi-calculi extend the pi-calculus with nominal datatypes to represent data, communication channels, and logics for facts and conditions. This general framework admits highly expr...
Magnus Johansson, Jesper Bengtson, Joachim Parrow,...
111
Voted
CCS
2011
ACM
14 years 19 days ago
Automatically optimizing secure computation
On the one hand, compilers for secure computation protocols, such as FairPlay or FairPlayMP, have significantly simplified the development of such protocols. On the other hand, ...
Florian Kerschbaum