Sciweavers

1769 search results - page 57 / 354
» Cryptography
Sort
View
ARITH
2009
IEEE
15 years 4 months ago
Hybrid Binary-Ternary Joint Form and Its Application in Elliptic Curve Cryptography
Jithra Adikari, Vassil S. Dimitrov, Laurent Imbert
AFRICACRYPT
2009
Springer
15 years 4 months ago
Fast Elliptic-Curve Cryptography on the Cell Broadband Engine
Neil Costigan, Peter Schwabe
FOCS
2009
IEEE
15 years 4 months ago
2-Source Extractors under Computational Assumptions and Cryptography with Defective Randomness
Abstract— We show how to efficiently extract truly random bits from two independent sources of linear min-entropy, under a computational assumption. The assumption we rely on is...
Yael Tauman Kalai, Xin Li, Anup Rao
ASIACRYPT
2009
Springer
15 years 4 months ago
On the Power of Two-Party Quantum Cryptography
Louis Salvail, Christian Schaffner, Miroslava Sot&...
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
15 years 4 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs