Sciweavers

1064 search results - page 211 / 213
» Cryptography from Anonymity
Sort
View
ECIS
2000
13 years 7 months ago
Retailing Digital Products
Current research activities in the area of trading digital products usually focus on specific legal or technical problems, neglecting the underlying business models and their impl...
Redmer Luxem, Lars H. Ehlers
ICISC
1998
110views Cryptology» more  ICISC 1998»
13 years 7 months ago
The nonhomomorphicity of S-boxes
Abstract. In this paper, we introduce the concept of kth-order nonhomomorphicity of mappings or S-boxes as an alternative indicator that forecasts nonlinearity characteristics of a...
Yuliang Zheng, Xian-Mo Zhang
CCS
2010
ACM
13 years 6 months ago
Modeling attacks on physical unclonable functions
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PU...
Ulrich Rührmair, Frank Sehnke, Jan Sölte...
JOC
2006
69views more  JOC 2006»
13 years 6 months ago
Characterization of Security Notions for Probabilistic Private-Key Encryption
The development of precise definitions of security for encryption, as well as a detailed understanding of their relationships, has been a major area of research in modern cryptogr...
Jonathan Katz, Moti Yung
CASES
2010
ACM
13 years 4 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont