Sciweavers

2237 search results - page 23 / 448
» On the Security of Random Sources
Sort
View
CSMR
2010
IEEE
14 years 4 months ago
ROMULUS: Domain Driven Design and Mashup Oriented Development Based on Open Source Java Metaframework for Pragmatic, Reliable an
Web software development is one of the most active areas and fastest growing industries in software and services development in Europe, and, in particular, Java Enterprise Edition ...
Boni García, Juan C. Dueñas, Jos&eac...
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
15 years 3 months ago
Provably Secure Masking of AES
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...
Johannes Blömer, Jorge Guajardo, Volker Krumm...
87
Voted
CCS
2006
ACM
15 years 1 months ago
Secure information flow with random assignment and encryption
Type systems for secure information flow aim to prevent a program from leaking information from variables classified as H to variables classified as L. In this work we extend such...
Geoffrey Smith
59
Voted
FOCS
2004
IEEE
15 years 1 months ago
On the (Im)possibility of Cryptography with Imperfect Randomness
We investigate the feasibility of a variety of cryptographic tasks with imperfect randomness. The kind of imperfect randomness we consider are entropy sources, such as those consi...
Yevgeniy Dodis, Shien Jin Ong, Manoj Prabhakaran, ...