Sciweavers

677 search results - page 63 / 136
» Secure Pseudonymous Channels
Sort
View
ICISC
2009
132views Cryptology» more  ICISC 2009»
14 years 9 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...
SP
2010
IEEE
327views Security Privacy» more  SP 2010»
15 years 3 months ago
Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow
– With software-as-a-service becoming mainstream, more and more applications are delivered to the client through the Web. Unlike a desktop application, a web application is split...
Shuo Chen, Rui Wang, XiaoFeng Wang, Kehuan Zhang
STOC
2002
ACM
159views Algorithms» more  STOC 2002»
16 years 4 days ago
On the composition of authenticated byzantine agreement
A fundamental problem of distributed computing is that of simulating a secure broadcast channel, within the setting of a point-to-point network. This problem is known as Byzantine...
Yehuda Lindell, Anna Lysyanskaya, Tal Rabin
ICC
2007
IEEE
165views Communications» more  ICC 2007»
15 years 6 months ago
Cryptographically Transparent Session Initiation Protocol (SIP) Proxies
—Proxies provide important rendezvous service in the Session Initiation Protocol (SIP), but it comes at a cost to privacy. A SIP proxy is privy to all of the signaling exchanged ...
Vijay K. Gurbani, Dean Willis, Francois Audet
CRYPTO
2006
Springer
97views Cryptology» more  CRYPTO 2006»
15 years 3 months ago
Robust Multiparty Computation with Linear Communication Complexity
We present a robust multiparty computation protocol. The protocol is for the cryptographic model with open channels and a polytime adversary, and allows n parties to actively secur...
Martin Hirt, Jesper Buus Nielsen