Sciweavers

2221 search results - page 102 / 445
» The Importance of Symmetric Representation
Sort
View
FSE
2006
Springer
117views Cryptology» more  FSE 2006»
15 years 1 months ago
How Far Can We Go on the x64 Processors?
This paper studies the state-of-the-art software optimization methodology for symmetric cryptographic primitives on the new 64-bit x64 processors, AMD Athlon64 (AMD64) and Intel Pe...
Mitsuru Matsui
PKC
2000
Springer
84views Cryptology» more  PKC 2000»
15 years 1 months ago
Forward Secrecy and Its Application to Future Mobile Communications Security
Abstract. Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (s...
DongGook Park, Colin Boyd, Sang-Jae Moon
ECCV
2010
Springer
15 years 10 days ago
An Oriented Flux Symmetry Based Active Contour Model for Three Dimensional Vessel Segmentation
This paper proposes a novel approach to segment three dimensional curvilinear structures, particularly vessels in angiography, by inspecting the symmetry of image gradients. The pr...
EUROCRYPT
2008
Springer
14 years 11 months ago
Towards Key-Dependent Message Security in the Standard Model
Standard security notions for encryption schemes do not guarantee any security if the encrypted messages depend on the secret key. Yet it is exactly the stronger notion of security...
Dennis Hofheinz, Dominique Unruh
DBSEC
2007
116views Database» more  DBSEC 2007»
14 years 11 months ago
Provably-Secure Schemes for Basic Query Support in Outsourced Databases
In this paper, we take a closer look at the security of outsourced databases (aka Database-as-the-Service or DAS), a topic of emerging importance. DAS allows users to store sensit...
Georgios Amanatidis, Alexandra Boldyreva, Adam O'N...