Sciweavers

1769 search results - page 141 / 354
» Cryptography
Sort
View
FOSAD
2004
Springer
15 years 8 months ago
A Tutorial on Physical Security and Side-Channel Attacks
Abstract. A recent branch of cryptography focuses on the physical constraints that a real-life cryptographic device must face, and attempts to exploit these constraints (running ti...
François Koeune, François-Xavier Sta...
FSE
2004
Springer
92views Cryptology» more  FSE 2004»
15 years 8 months ago
Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions
Recent research shows that the class of Rotation Symmetric Boolean Functions (RSBFs), i.e., the class of Boolean functions that are invariant under circular translation of indices,...
Pantelimon Stanica, Subhamoy Maitra, John A. Clark
PERVASIVE
2004
Springer
15 years 8 months ago
A Fault-Tolerant Key-Distribution Scheme for Securing Wireless Ad Hoc Networks
We propose a novel solution for securing wireless ad-hoc networks. Our goal is to provide secure key exchange in the presence of device failures and denial-of-service attacks. The ...
Arno Wacker, Timo Heiber, Holger Cermann, Pedro Jo...
137
Voted
PKC
2004
Springer
146views Cryptology» more  PKC 2004»
15 years 8 months ago
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model
Abstract. In this paper, we provide the first committed signature provably secure in the standard complexity model based on the strong RSA assumption. The idea behind the construc...
Huafei Zhu
120
Voted
DATE
2003
IEEE
88views Hardware» more  DATE 2003»
15 years 8 months ago
Ubiquitous Access to Reconfigurable Hardware: Application Scenarios and Implementation Issues
This paper presents an approach for the integration of reconfigurable hardware and computer applications based on the concept of ubiquitous computing. The goal is to allow a netwo...
Leandro Soares Indrusiak, Florian Lubitz, Ricardo ...