Sciweavers

1777 search results - page 166 / 356
» Programming Cryptographic Protocols
Sort
View
DAC
2010
ACM
15 years 5 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
ESORICS
2010
Springer
15 years 2 months ago
On E-Vote Integrity in the Case of Malicious Voter Computers
Norway has started to implement e-voting (over the Internet, and by using voters' own computers) within the next few years. The vulnerability of voter's computers was ide...
Sven Heiberg, Helger Lipmaa, Filip van Laenen
CORR
2010
Springer
128views Education» more  CORR 2010»
15 years 1 months ago
Random Oracles in a Quantum World
Once quantum computers reach maturity most of today's traditional cryptographic schemes based on RSA or discrete logarithms become vulnerable to quantum-based attacks. Hence, ...
Özgür Dagdelen, Marc Fischlin, Anja Lehm...
CORR
2006
Springer
114views Education» more  CORR 2006»
15 years 1 months ago
A New Cryptosystem Based On Hidden Order Groups
Let G1 be a cyclic multiplicative group of order n. It is known that the Diffie-Hellman problem is random self-reducible in G1 with respect to a fixed generator g if (n) is known....
Amitabh Saxena, Ben Soh
INFOCOM
2010
IEEE
14 years 11 months ago
INPAC: An Enforceable Incentive Scheme for Wireless Networks using Network Coding
—Wireless mesh networks have been widely deployed to provide broadband network access, and their performance can be significantly improved by using a new technology called netwo...
Tingting Chen, Sheng Zhong