Sciweavers

2432 search results - page 6 / 487
» Cryptographic logical relations
Sort
View
EUSFLAT
2009
125views Fuzzy Logic» more  EUSFLAT 2009»
14 years 7 months ago
Fuzzy Intersection and Difference Model for Topological Relations
Ahed Alboody, Florence Sedes, Jordi Inglada
DBSEC
2007
89views Database» more  DBSEC 2007»
14 years 11 months ago
Design and Analysis of Querying Encrypted Data in Relational Databases
Security and privacy concerns as well as legal considerations force many companies to encrypt the sensitive data in databases. However, storing the data in an encrypted format enta...
Mustafa Canim, Murat Kantarcioglu
DATE
2007
IEEE
92views Hardware» more  DATE 2007»
15 years 4 months ago
Overcoming glitches and dissipation timing skews in design of DPA-resistant cryptographic hardware
Cryptographic embedded systems are vulnerable to Differential Power Analysis (DPA) attacks. In this paper, we propose a logic design style, called as Precharge Masked Reed-Muller ...
Kuan Jen Lin, Shan Chien Fang, Shih Hsien Yang, Ch...
FOSSACS
2007
Springer
15 years 4 months ago
Relational Parametricity and Separation Logic
Abstract. Separation logic is a recent extension of Hoare logic for reasoning about programs with references to shared mutable data structures. In this paper, we provide a new inte...
Lars Birkedal, Hongseok Yang
TCC
2010
Springer
170views Cryptology» more  TCC 2010»
15 years 1 months ago
On Related-Secret Pseudorandomness
Related-key attacks are attacks against constructions which use a secret key (such as a blockcipher) in which an attacker attempts to exploit known or chosen relationships among ke...
David Goldenberg, Moses Liskov