Sciweavers

773 search results - page 18 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
OTM
2007
Springer
15 years 8 months ago
Compiler Assisted Elliptic Curve Cryptography
Abstract. Although cryptographic implementation tasks are often undertaken by expert programmers, a plethora of performance and security driven options, as well as more mundane sof...
Manuel Barbosa, Andrew Moss, Dan Page
CAV
2010
Springer
168views Hardware» more  CAV 2010»
14 years 12 months ago
A Dash of Fairness for Compositional Reasoning
Abstract. Proofs of progress properties often require fairness assumptions. Incorporating global fairness assumptions in a compositional method is a challenge, however, given the l...
Ariel Cohen 0002, Kedar S. Namjoshi, Yaniv Sa'ar
120
Voted
CARDIS
2006
Springer
109views Hardware» more  CARDIS 2006»
15 years 5 months ago
A Smart Card-Based Mental Poker System
On-line casinos have experienced a great expansion since the generalized use of Internet started. There exist in the literature several proposals of systems allowing secure remote ...
Jordi Castellà-Roca, Josep Domingo-Ferrer, ...
103
Voted
MOBICOM
1999
ACM
15 years 6 months ago
Next Century Challenges: RadioActive Networks
A key challenge facing wireless networking is to utilize the spectrum as e ciently as possible given current channel conditions and in the most e ective way for each application. ...
Vanu G. Bose, David Wetherall, John V. Guttag
EUROCRYPT
2005
Springer
15 years 7 months ago
The RSA Group is Pseudo-Free
We prove, under the strong RSA assumption, that the group of invertible integers modulo the product of two safe primes is pseudo-free. More specifically, no polynomial time algor...
Daniele Micciancio