Sciweavers

45 search results - page 8 / 9
» Cryptography in Quadratic Function Fields
Sort
View
EUROCRYPT
2009
Springer
15 years 10 months ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...
CHES
2009
Springer
200views Cryptology» more  CHES 2009»
15 years 10 months ago
Accelerating AES with Vector Permute Instructions
We demonstrate new techniques to speed up the Rijndael (AES) block cipher using vector permute instructions. Because these techniques avoid data- and key-dependent branches and mem...
Mike Hamburg
PKC
2009
Springer
164views Cryptology» more  PKC 2009»
15 years 10 months ago
Asynchronous Multiparty Computation: Theory and Implementation
Abstract. We propose an asynchronous protocol for general multiparty computation with perfect security and communication complexity O(n2 |C|k) where n is the number of parties, |C|...
Ivan Damgård, Jesper Buus Nielsen, Martin Ge...
SPW
2000
Springer
15 years 1 months ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano
SIAMNUM
2010
126views more  SIAMNUM 2010»
14 years 4 months ago
Smoothing under Diffeomorphic Constraints with Homeomorphic Splines
In this paper we introduce a new class of diffeomorphic smoothers based on general spline smoothing techniques and on the use of some tools that have been recently developed in th...
Jérémie Bigot, Sébastien Gada...