Sciweavers

341 search results - page 62 / 69
» Deniable Functional Encryption
Sort
View
84
Voted
CIKM
2005
Springer
15 years 3 months ago
Securing XML data in third-party distribution systems
Web-based third-party architectures for data publishing are today receiving growing attention, due to their scalability and the ability to efficiently manage large numbers of use...
Barbara Carminati, Elena Ferrari, Elisa Bertino
ACMSE
2004
ACM
15 years 3 months ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
AES
2004
Springer
151views Cryptology» more  AES 2004»
15 years 3 months ago
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
This paper is about the design of multivariate public key schemes, as well as block and stream ciphers, in relation to recent attacks that exploit various types of multivariate alg...
Nicolas Courtois
MSE
2003
IEEE
104views Hardware» more  MSE 2003»
15 years 3 months ago
Internet-based Tool for System-on-Chip Integration
A tool has been created for use in a design course to automate integration of new components into a SystemOn-Chip (SoC). Students used this tool to implement a complete SoC Intern...
David Lim, Christopher E. Neely, Christopher K. Zu...
FCCM
2002
IEEE
174views VLSI» more  FCCM 2002»
15 years 3 months ago
PAM-Blox II: Design and Evaluation of C++ Module Generation for Computing with FPGAs
This paper explores the implications of integrating flexible module generation into a compiler for FPGAs. The objective is to improve the programmabilityof FPGAs, or in other wor...
Oskar Mencer