Sciweavers

372 search results - page 64 / 75
» On the Security of a Unified Countermeasure
Sort
View
86
Voted
ICISC
2009
132views Cryptology» more  ICISC 2009»
14 years 7 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
15 years 4 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
97
Voted
CRYPTO
2010
Springer
228views Cryptology» more  CRYPTO 2010»
14 years 10 months ago
On Generalized Feistel Networks
We prove beyond-birthday-bound security for most of the well-known types of generalized Feistel networks: (1) unbalanced Feistel networks, where the n-bit to m-bit round functions ...
Viet Tung Hoang, Phillip Rogaway
CIDR
2009
126views Algorithms» more  CIDR 2009»
14 years 10 months ago
Declarative Reconfigurable Trust Management
In recent years, there has been a proliferation of declarative logic-based trust management languages and systems proposed to ease the description, configuration, and enforcement ...
William R. Marczak, David Zook, Wenchao Zhou, Molh...
FASE
2007
Springer
15 years 3 months ago
Software Product Families: Towards Compositionality
- Static Analysis and Abstract Interpretation I (Chair: Sophia Drossopulou, room: Multicert) • FASE - Specification (Chair: Marsha Chechik, room: Cisco) • TACAS - Specificati...
Jan Bosch