Sciweavers

677 search results - page 27 / 136
» Secure Pseudonymous Channels
Sort
View
CP
2000
Springer
15 years 6 months ago
Constraints, Inference Channels and Secure Databases
Alexander Brodsky, Csilla Farkas, Duminda Wijeseke...
CHES
2006
Springer
75views Cryptology» more  CHES 2006»
15 years 5 months ago
Towards Security Limits in Side-Channel Attacks
François-Xavier Standaert, Eric Peeters, C&...
FSE
2008
Springer
109views Cryptology» more  FSE 2008»
15 years 3 months ago
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouf...
IANDC
2002
51views more  IANDC 2002»
15 years 1 months ago
Secure Implementation of Channel Abstractions
Martín Abadi, Cédric Fournet, George...
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
16 years 2 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...