Sciweavers

488 search results - page 49 / 98
» Policy-Based Cryptography and Applications
Sort
View
99
Voted
ACNS
2005
Springer
97views Cryptology» more  ACNS 2005»
15 years 6 months ago
Quantifying Security in Hybrid Cellular Networks
Abstract. We propose a micro-payment scheme for symmetric multihop cellular networks that encourages intermediaries to transmit packets and recipients to provide auditing informati...
Markus Jakobsson, Liu Yang
CHES
2005
Springer
146views Cryptology» more  CHES 2005»
15 years 6 months ago
AES on FPGA from the Fastest to the Smallest
Two new FPGA designs for the Advanced Encryption Standard (AES) are presented. The first is believed to be the fastest, achieving 25 Gbps throughput using a Xilinx Spartan-III (XC3...
Tim Good, Mohammed Benaissa
142
Voted
PKC
1998
Springer
158views Cryptology» more  PKC 1998»
15 years 4 months ago
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation
One-way hash functions are an important tool in achieving authentication and data integrity. The aim of this paper is to propose a novel one-way hash function based on cellular aut...
Miodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai
FPL
2000
Springer
116views Hardware» more  FPL 2000»
15 years 4 months ago
High-Level Area and Performance Estimation of Hardware Building Blocks on FPGAs
Abstract. Field-programmable gate arrays (FPGAs) have become increasingly interesting in system design and due to the rapid technological progress ever larger devices are commercia...
Rolf Enzler, Tobias Jeger, Didier Cottet, Gerhard ...
NSDI
2008
15 years 3 months ago
Securing Distributed Systems with Information Flow Control
Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DI...
Nickolai Zeldovich, Silas Boyd-Wickizer, David Maz...