Sciweavers

1005 search results - page 116 / 201
» Practical Secure Function Evaluation
Sort
View
117
Voted
GLVLSI
2007
IEEE
107views VLSI» more  GLVLSI 2007»
15 years 9 months ago
Side-channel resistant system-level design flow for public-key cryptography
In this paper, we propose a new design methodology to assess the risk for side-channel attacks, more specifically timing analysis and simple power analysis, at an early design st...
Kazuo Sakiyama, Elke De Mulder, Bart Preneel, Ingr...
109
Voted
POLICY
2005
Springer
15 years 8 months ago
Obligation Policies: An Enforcement Platform
The use of policy-based mechanisms significantly reduces the complexity associated with applicational development and operation. In particular, history-based policies allow the s...
Pedro Gama, Paulo Ferreira
133
Voted
VLDB
1993
ACM
73views Database» more  VLDB 1993»
15 years 6 months ago
A Model of Methods Access Authorization in Object-oriented Databases
Object-oriented databases are a recent and important development and many studies of them have been performed. These consider aspects such as data modeling, query languages, perfo...
Nurit Gal-Oz, Ehud Gudes, Eduardo B. Fernán...
117
Voted
CRYPTO
2010
Springer
186views Cryptology» more  CRYPTO 2010»
15 years 3 months ago
Additively Homomorphic Encryption with d-Operand Multiplications
The search for encryption schemes that allow to evaluate functions (or circuits) over encrypted data has attracted a lot of attention since the seminal work on this subject by Rive...
Carlos Aguilar Melchor, Philippe Gaborit, Javier H...
114
Voted
CRYPTO
2005
Springer
96views Cryptology» more  CRYPTO 2005»
15 years 8 months ago
Privacy-Preserving Set Operations
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private i...
Lea Kissner, Dawn Xiaodong Song