Sciweavers

391 search results - page 3 / 79
» Secure Multiparty AES
Sort
View
ACISP
2006
Springer
14 years 13 days ago
Cache Based Power Analysis Attacks on AES
Jacques J. A. Fournier, Michael Tunstall
STOC
2002
ACM
130views Algorithms» more  STOC 2002»
14 years 6 months ago
Secure multi-party quantum computation
Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation...
Claude Crépeau, Daniel Gottesman, Adam Smit...
SCN
2010
Springer
129views Communications» more  SCN 2010»
13 years 4 months ago
Improved Primitives for Secure Multiparty Integer Computation
We consider a collection of related multiparty computation protocols that provide core operations for secure integer and fixed-point computation. The higher-level protocols offer...
Octavian Catrina, Sebastiaan de Hoogh
CTRSA
2006
Springer
118views Cryptology» more  CTRSA 2006»
13 years 10 months ago
Stand-Alone and Setup-Free Verifiably Committed Signatures
Abstract. In this paper, we first demonstrate a gap between the security of verifiably committed signatures in the two-party setting and the security of verifiably committed signat...
Huafei Zhu, Feng Bao
FSE
2005
Springer
119views Cryptology» more  FSE 2005»
13 years 12 months ago
The Poly1305-AES Message-Authentication Code
Poly1305-AES is a state-of-the-art message-authentication code suitable for a wide variety of applications. Poly1305-AES computes a 16-byte authenticator of a variable-length messa...
Daniel J. Bernstein