Sciweavers

391 search results - page 24 / 79
» Secure Multiparty AES
Sort
View
82
Voted
ECCC
2011
223views ECommerce» more  ECCC 2011»
14 years 4 months ago
A Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation
Gilad Asharov, Yehuda Lindell
DSD
2006
IEEE
183views Hardware» more  DSD 2006»
15 years 3 months ago
Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core
The Advanced Encryption Standard (AES) algorithm has become the default choice for various security services in numerous applications. In this paper we present an AES encryption h...
Panu Hämäläinen, Timo Alho, Marko H...
CHES
2005
Springer
80views Cryptology» more  CHES 2005»
15 years 3 months ago
Successfully Attacking Masked AES Hardware Implementations
During the last years, several masking schemes for AES have been proposed to secure hardware implementations against DPA attacks. In order to investigate the effectiveness of thes...
Stefan Mangard, Norbert Pramstaller, Elisabeth Osw...
PKC
2009
Springer
164views Cryptology» more  PKC 2009»
15 years 10 months ago
Asynchronous Multiparty Computation: Theory and Implementation
Abstract. We propose an asynchronous protocol for general multiparty computation with perfect security and communication complexity O(n2 |C|k) where n is the number of parties, |C|...
Ivan Damgård, Jesper Buus Nielsen, Martin Ge...