Sciweavers

204 search results - page 4 / 41
» On the Design and Implementation of an Efficient DAA Scheme
Sort
View
CSREASAM
2009
14 years 10 months ago
A Tripartite Strong Designated Verifier Scheme Based On Threshold RSA Signatures
In this paper we propose a new designated verifier signature scheme based on the threshold signature scheme presented [8] by Ghodosi and Pieprzyk. The advantages of the new scheme ...
Jerome Dossogne, Olivier Markowitch
111
Voted
ANCS
2005
ACM
15 years 3 months ago
Segmented hash: an efficient hash table implementation for high performance networking subsystems
Hash tables provide efficient table implementations, achieving O(1), query, insert and delete operations at low loads. However, at moderate or high loads collisions are quite freq...
Sailesh Kumar, Patrick Crowley
96
Voted
CHES
2009
Springer
265views Cryptology» more  CHES 2009»
15 years 10 months ago
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually...
Matthieu Rivain, Emmanuel Prouff, Julien Doget
VTC
2006
IEEE
102views Communications» more  VTC 2006»
15 years 3 months ago
Backward Compatible Modulation Schemes for Improving Spectrum Efficiency in DAB Systems
In this study, a new physical layer transmission technique is proposed with the spectrum efficiency up to two times of that of the Eureka-147 DAB system. The proposed technique com...
Chih-Yang Kao, Ming-Chien Tseng, Ching-Yung Chen, ...
CN
2006
85views more  CN 2006»
14 years 9 months ago
A scalable and decentralized fast-rerouting scheme with efficient bandwidth sharing
This paper focuses on the protection of virtual circuits (Label Switched Paths, LSPs) in a (G)MPLS (Generalised Multi-Protocol Label Switching) network. The proposed algorithm is ...
Simon Balon, Laurent Mélon, Guy Leduc