Sciweavers

2967 search results - page 511 / 594
» Cryptology
Sort
View
IMA
2009
Springer
221views Cryptology» more  IMA 2009»
15 years 4 months ago
Cache Timing Analysis of LFSR-Based Stream Ciphers
Cache timing attacks are a class of side-channel attacks that is applicable against certain software implementations. They have generated significant interest when demonstrated ag...
Gregor Leander, Erik Zenner, Philip Hawkes
IMA
2009
Springer
152views Cryptology» more  IMA 2009»
15 years 4 months ago
Codes as Modules over Skew Polynomial Rings
In previous works we considered codes defined as ideals of quotients of skew polynomial rings, so called Ore rings of automorphism type. In this paper we consider codes defined a...
Delphine Boucher, Felix Ulmer
PAIRING
2009
Springer
124views Cryptology» more  PAIRING 2009»
15 years 4 months ago
Fast Hashing to G2 on Pairing-Friendly Curves
When using pairing-friendly ordinary elliptic curves over prime fields to implement identity-based protocols, there is often a need to hash identities to points on one or both of ...
Michael Scott, Naomi Benger, Manuel Charlemagne, L...
PAIRING
2009
Springer
119views Cryptology» more  PAIRING 2009»
15 years 4 months ago
Compact E-Cash and Simulatable VRFs Revisited
Abstract. Efficient non-interactive zero-knowledge proofs are a powerful tool for solving many cryptographic problems. We apply the recent Groth-Sahai (GS) proof system for pairing...
Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, A...
SACRYPT
2009
Springer
150views Cryptology» more  SACRYPT 2009»
15 years 4 months ago
Information Theoretically Secure Multi Party Set Intersection Re-visited
We re-visit the problem of secure multiparty set intersection in information theoretic settings. In [16], Li et.al have proposed a protocol for multiparty set intersection problem...
Arpita Patra, Ashish Choudhary, C. Pandu Rangan