Sciweavers

3486 search results - page 74 / 698
» On the Design and Security of RC2
Sort
View
GLOBECOM
2010
IEEE
14 years 9 months ago
Providing Secrecy Irrespective of Eavesdropper's Channel State
A usual concern against physical layer security is that the legitimate parties would need to have (partial) channel state information (CSI) of the eavesdropper in order to design t...
Xiang He, Aylin Yener
IACR
2011
105views more  IACR 2011»
13 years 10 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi
ASAP
2008
IEEE
182views Hardware» more  ASAP 2008»
15 years 5 months ago
Low-cost implementations of NTRU for pervasive security
NTRU is a public-key cryptosystem based on the shortest vector problem in a lattice which is an alternative to RSA and ECC. This work presents a compact and low power NTRU design ...
Ali Can Atici, Lejla Batina, Junfeng Fan, Ingrid V...
77
Voted
DAC
1998
ACM
16 years 1 days ago
Data Security for Web-based CAD
Scott Hauck, Stephen Knol
FC
2007
Springer
104views Cryptology» more  FC 2007»
15 years 5 months ago
A Sense of Security in Pervasive Computing - Is the Light on When the Refrigerator Door Is Closed?
In this paper, we investigate how existing theoretical contributions on usable security can serve to guide the design of a specific system. We illustrate how going through this the...
Jakob Illeborg Pagter, Marianne Graves Petersen