Sciweavers

195 search results - page 10 / 39
» E-voting - a Key to Independence for All
Sort
View
CTRSA
2008
Springer
110views Cryptology» more  CTRSA 2008»
15 years 1 months ago
RFID Security: Tradeoffs between Security and Efficiency
Recently, Juels and Weis defined strong privacy for RFID tags. We add to this definition a completeness and a soundness requirement, i.e., a reader should accept valid tags and onl...
Ivan Damgård, Michael Østergaard Pede...
ASIACRYPT
1998
Springer
15 years 3 months ago
Analysis Methods for (Alleged) RC4
Abstract. The security of the alleged RC4 stream cipher and some variants is investigated. Cryptanalytic algorithms are developed for a known plaintext attack where only a small se...
Lars R. Knudsen, Willi Meier, Bart Preneel, Vincen...
75
Voted
ICALP
2010
Springer
15 years 4 months ago
Tight Thresholds for Cuckoo Hashing via XORSAT
We settle the question of tight thresholds for offline cuckoo hashing. The problem can be stated as follows: we have n keys to be hashed into m buckets each capable of holding a s...
Martin Dietzfelbinger, Andreas Goerdt, Michael Mit...
PLDI
2012
ACM
13 years 2 months ago
RockSalt: better, faster, stronger SFI for the x86
Software-based fault isolation (SFI), as used in Google’s Native Client (NaCl), relies upon a conceptually simple machine-code analysis to enforce a security policy. But for com...
Greg Morrisett, Gang Tan, Joseph Tassarotti, Jean-...
80
Voted
IJCV
2012
13 years 2 months ago
Impact of Landmark Parametrization on Monocular EKF-SLAM with Points and Lines
Abstract This paper explores the impact that landmark parametrization has in the performance of monocular, EKFbased, 6-DOF simultaneous localization and mapping (SLAM) in the conte...
Joan Solà, Teresa A. Vidal-Calleja, Javier ...