Sciweavers

5344 search results - page 268 / 1069
» Privacy-Preserving Set Operations
Sort
View
CHES
2003
Springer
115views Cryptology» more  CHES 2003»
15 years 9 months ago
The Doubling Attack - Why Upwards Is Better than Downwards
The recent developments of side channel attacks have lead implementers to use more and more sophisticated countermeasures in critical operations such as modular exponentiation, or ...
Pierre-Alain Fouque, Frédéric Valett...
CRYPTO
2003
Springer
173views Cryptology» more  CRYPTO 2003»
15 years 9 months ago
A Tweakable Enciphering Mode
We describe a block-cipher mode of operation, CMC, that turns an n-bit block cipher into a tweakable enciphering scheme that acts on strings of mn bits, where m ≥ 2. When the und...
Shai Halevi, Phillip Rogaway
ICEIS
2002
IEEE
15 years 9 months ago
Managing Uncertain Trajectories of Moving Objects with Domino
: This work describes the features of the DOMINO (Database fOr MovINg Objects) system, which brings several novelties to the problem of managing moving objects databases. Our robus...
Goce Trajcevski, Ouri Wolfson, Hu Cao, Hai Lin, Fe...
CPAIOR
2010
Springer
15 years 8 months ago
Strong Combination of Ant Colony Optimization with Constraint Programming Optimization
We introduce an approach which combines ACO (Ant Colony Optimization) and IBM ILOG CP Optimizer for solving COPs (Combinatorial Optimization Problems). The problem is modeled using...
Madjid Khichane, Patrick Albert, Christine Solnon
ICALP
2001
Springer
15 years 8 months ago
Symbolic Trace Analysis of Cryptographic Protocols
A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
Michele Boreale