Sciweavers

8499 search results - page 20 / 1700
» cans 2009
Sort
View
104
Voted
CANS
2009
Springer
109views Cryptology» more  CANS 2009»
15 years 7 months ago
Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves
This paper describes the design of a fast multi-core library for the cryptographic Tate pairing over supersingular elliptic curves. For the computation of the reduced modified Tat...
Jean-Luc Beuchat, Emmanuel López-Trejo, Lui...
104
Voted
IACR
2011
129views more  IACR 2011»
14 years 11 days ago
Improved Side Channel Cube Attacks on PRESENT
: The paper presents several improved side channel cube attacks on PRESENT based on single bit leakage model. Compared with the previous study of Yang et al in CANS 2009 [30], base...
Xin-jie Zhao, Tao Wang, Shi-ze Guo
PET
2009
Springer
15 years 7 months ago
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases
: © Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao HP Labor...
Brian Thompson, Stuart Haber, William G. Horne, To...
84
Voted
WINE
2009
Springer
123views Economy» more  WINE 2009»
15 years 7 months ago
Pseudonyms in Cost-Sharing Games
This work initiates the study of cost-sharing mechanisms that, in addition to the usual incentive compatibility conditions, make it disadvantageous for the users to employ pseudon...
Paolo Penna, Florian Schoppmann, Riccardo Silvestr...
102
Voted
ICUMT
2009
14 years 10 months ago
Adaptive resource control in 2-hop ad-hoc networks
This paper presents a simple resource control mechanism with traffic scheduling for 2-hop ad-hoc networks, in which the Request-To-Send (RTS) packet is utilized to deliver feedback...
Yimeng Yang, Geert J. Heijenk, Boudewijn R. Haverk...