Sciweavers

2108 search results - page 57 / 422
» Encrypted
Sort
View
SCN
2008
Springer
142views Communications» more  SCN 2008»
15 years 1 months ago
A New DPA Countermeasure Based on Permutation Tables
Abstract. We propose and analyse a new countermeasure against Differential Power Analysis (DPA) for the AES encryption algorithm, based on permutation tables. As opposed to existin...
Jean-Sébastien Coron
86
Voted
COMCOM
2004
83views more  COMCOM 2004»
15 years 1 months ago
Breaking network security based on synchronized chaos
Very recently, the use of chaos synchronization as a means of masking information data in a network has been proposed. Although it is claimed that the security breach is not possi...
Gonzalo Álvarez, Shujun Li
151
Voted
BIOSIG
2009
136views Biometrics» more  BIOSIG 2009»
14 years 11 months ago
Tamper-proof and Privacy-protected Fingerprint Identification Systems
: In this paper alternatives of tamper-proof and privacy-protected biometric identification systems are shown. One approach to secure such databases is to use cryptography. With it...
Michael Schwaiger
131
Voted
EUROCRYPT
2011
Springer
14 years 4 months ago
Making NTRU as Secure as Worst-Case Problems over Ideal Lattices
Abstract. NTRUEncrypt, proposed in 1996 by Hostein, Pipher and Silverman, is the fastest known lattice-based encryption scheme. Its moderate key-sizes, excellent asymptotic perfor...
Damien Stehlé, Ron Steinfeld
109
Voted
ESORICS
2009
Springer
16 years 1 months ago
Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption
In distributed systems users need to share sensitive objects with others based on the recipients' ability to satisfy a policy. Attribute-Based Encryption (ABE) is a new parad...
Rakeshbabu Bobba, Himanshu Khurana, Manoj Prabhaka...