Sciweavers

1769 search results - page 10 / 354
» Cryptography
Sort
View
103
Voted
ACNS
2008
Springer
102views Cryptology» more  ACNS 2008»
15 years 11 months ago
Repelling Detour Attack Against Onions with Re-encryption
Marek Klonowski, Miroslaw Kutylowski, Anna Lauks
ACNS
2007
Springer
147views Cryptology» more  ACNS 2007»
15 years 11 months ago
BAP: Broadcast Authentication Using Cryptographic Puzzles
Patrick Schaller, Srdjan Capkun, David A. Basin
ACNS
2007
Springer
85views Cryptology» more  ACNS 2007»
15 years 11 months ago
Midpoints Versus Endpoints: From Protocols to Firewalls
Diana von Bidder, David A. Basin, Germano Caronni
104
Voted
CHES
2007
Springer
131views Cryptology» more  CHES 2007»
15 years 11 months ago
Gaussian Mixture Models for Higher-Order Side Channel Analysis
Kerstin Lemke-Rust, Christof Paar
CHES
2007
Springer
131views Cryptology» more  CHES 2007»
15 years 11 months ago
Differential Behavioral Analysis
Bruno Robisson, Pascal Manet