Sciweavers

14824 search results - page 2474 / 2965
» Security - Introduction
Sort
View
144
Voted
CHI
2009
ACM
16 years 5 months ago
Designing a privacy label: assisting consumer understanding of online privacy practices
This project describes the continuing development of a Privacy Label to present to consumers the ways organizations collect, use, and share personal information. Several studies h...
Patrick Gage Kelley
129
Voted
EUROCRYPT
2009
Springer
16 years 5 months ago
A Leakage-Resilient Mode of Operation
A weak pseudorandom function (wPRF) is a cryptographic primitive similar to ? but weaker than ? a pseudorandom function: for wPRFs one only requires that the output is pseudorandom...
Krzysztof Pietrzak
151
Voted
EUROCRYPT
2009
Springer
16 years 5 months ago
Key Agreement from Close Secrets over Unsecured Channels
We consider information-theoretic key agreement between two parties sharing somewhat different versions of a secret w that has relatively little entropy. Such key agreement, also ...
Bhavana Kanukurthi, Leonid Reyzin
EUROCRYPT
2009
Springer
16 years 5 months ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...
139
Voted
CHES
2009
Springer
229views Cryptology» more  CHES 2009»
16 years 5 months ago
KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers
Abstract. In this paper we propose a new family of very efficient hardware oriented block ciphers. The family contains six block ciphers divided into two flavors. All block ciphers...
Christophe De Cannière, Orr Dunkelman, Miro...
« Prev « First page 2474 / 2965 Last » Next »