Sciweavers

1610 search results - page 202 / 322
» Identity Based Multisignatures
Sort
View
98
Voted
DAC
2005
ACM
15 years 2 months ago
Circuit optimization using statistical static timing analysis
In this paper, we propose a new sensitivity based, statistical gate sizing method. Since circuit optimization effects the entire shape of the circuit delay distribution, it is dif...
Aseem Agarwal, Kaviraj Chopra, David Blaauw, Vladi...
104
Voted
EUROCRYPT
2009
Springer
16 years 1 months ago
Smashing SQUASH-0
At the RFID Security Workshop 2007, Adi Shamir presented a new challenge-response protocol well suited for RFIDs, although based on the Rabin public-key cryptosystem. This protocol...
Khaled Ouafi, Serge Vaudenay
86
Voted
APBC
2004
125views Bioinformatics» more  APBC 2004»
15 years 2 months ago
A Dihedral Angle Database of Short Sub-sequences for Protein Structure Prediction
Protein structure prediction is considered to be the holy grail of bioinformatics. Ab initio and homology modelling are two important groups of methods used in protein structure p...
Saravanan Dayalan, Savitri Bevinakoppa, Heiko Schr...
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
15 years 7 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters
107
Voted
CCS
2009
ACM
15 years 5 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...