Sciweavers

380 search results - page 26 / 76
» Intrusion-Resilient Secret Sharing
Sort
View
IMA
1995
Springer
92views Cryptology» more  IMA 1995»
15 years 1 months ago
On-Line Secret Sharing
Christian Cachin
DAC
2008
ACM
14 years 11 months ago
Protecting bus-based hardware IP by secret sharing
Our work addresses protection of hardware IP at the mask level with the goal of preventing unauthorized manufacturing. The proposed protocol based on chip locking and activation i...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
74
Voted
AMC
2005
122views more  AMC 2005»
14 years 9 months ago
A secret sharing scheme based on cellular automata
Ángel Martín del Rey, J. Pereira Mat...
CSFW
2012
IEEE
13 years 9 days ago
Verifying Privacy-Type Properties in a Modular Way
—Formal methods have proved their usefulness for analysing the security of protocols. In this setting, privacy-type security properties (e.g. vote-privacy, anonymity, unlinkabili...
Myrto Arapinis, Vincent Cheval, Stéphanie D...