Sciweavers

2432 search results - page 161 / 487
» Cryptographic logical relations
Sort
View
111
Voted
CCS
2006
ACM
15 years 4 months ago
Cryptanalysis of the "Grain" family of stream ciphers
Let us have an NLFSR with the feedback function g(x) and an LFSR with the generating polynomial f(x). The function g(x) is a Boolean function on the state of the NLFSR and the LFS...
Alexander Maximov
113
Voted
FOSSACS
2006
Springer
15 years 4 months ago
Guessing Attacks and the Computational Soundness of Static Equivalence
The indistinguishability of two pieces of data (or two lists of pieces of data) can be represented formally in terms of a relation called static equivalence. Static equivalence dep...
Martín Abadi, Mathieu Baudet, Bogdan Warins...
71
Voted
USS
2008
15 years 3 months ago
Administrative and Public Verifiability: Can We Have Both?
Administrative verifiability gives election officials the means to protect against certain kinds of errors and fraud. This is typically accomplished with tools like paper audit tr...
Josh Benaloh
BIOID
2008
101views Biometrics» more  BIOID 2008»
15 years 2 months ago
Template Protection for On-Line Signature-Based Recognition Systems
Abstract. Security and privacy issues are considered as two of the major concerns related to the use of biometric data for authentication purposes. In this paper we propose two dif...
Emanuele Maiorana, Patrizio Campisi, Alessandro Ne...
80
Voted
DLT
2007
15 years 2 months ago
Inapproximability of Nondeterministic State and Transition Complexity Assuming P=!NP
Abstract. Inapproximability results concerning minimization of nondeterministic finite automata relative to given deterministic finite automata were obtained only recently, modul...
Hermann Gruber, Markus Holzer