Sciweavers

677 search results - page 27 / 136
» Secure Pseudonymous Channels
Sort
View
CP
2000
Springer
15 years 2 months ago
Constraints, Inference Channels and Secure Databases
Alexander Brodsky, Csilla Farkas, Duminda Wijeseke...
54
Voted
CHES
2006
Springer
75views Cryptology» more  CHES 2006»
15 years 1 months ago
Towards Security Limits in Side-Channel Attacks
François-Xavier Standaert, Eric Peeters, C&...
FSE
2008
Springer
109views Cryptology» more  FSE 2008»
14 years 11 months ago
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouf...
IANDC
2002
51views more  IANDC 2002»
14 years 9 months ago
Secure Implementation of Channel Abstractions
Martín Abadi, Cédric Fournet, George...
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
15 years 10 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...