Sciweavers

2108 search results - page 168 / 422
» Encrypted
Sort
View
98
Voted
CSE
2009
IEEE
15 years 4 months ago
Efficient Translation of Algorithmic Kernels on Large-Scale Multi-cores
In this paper we present the design of a novel embedded processor architecture (which we call a
Amit Pande, Joseph Zambreno
IJNSEC
2008
140views more  IJNSEC 2008»
15 years 3 months ago
Distributed Paillier Plaintext Equivalence Test
Consider the following scenario with N + 2 parties, A, B, X1, X2,
Pei-Yih Ting, Xiao-Wei Huang
IJNSEC
2006
113views more  IJNSEC 2006»
15 years 3 months ago
An Identity-based Mediated Signature Scheme from Bilinear Pairing
It has always been a critical issue to find efficient methods for fast revocation of a user's identity in identity (ID)based cryptosystems. Unfortunately, none of the previou...
Xiangguo Cheng, Lifeng Guo, Xinmei Wang
142
Voted
TCS
2008
15 years 3 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
125
Voted
SIGPRO
2002
158views more  SIGPRO 2002»
15 years 3 months ago
Parallel stream cipher for secure high-speed communications
Due to ongoing improvements in high-speed communications, the speed of data encryption must also increase. Accordingly, this paper proposes an PS-LFSR with an m(
Hoon Jae Lee, Sang-Jae Moon