Sciweavers

12 search results - page 1 / 3
» cisc 2009
Sort
View
CISC
2009
Springer
134views Cryptology» more  CISC 2009»
14 years 10 months ago
Weaknesses in Two Recent Lightweight RFID Authentication Protocols
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan...
SIPEW
2009
Springer
119views Hardware» more  SIPEW 2009»
15 years 6 months ago
A Tale of Two Processors: Revisiting the RISC-CISC Debate
The contentious debates between RISC and CISC have died down, and a CISC ISA, the x86 continues to be popular. Nowadays, processors with CISC-ISAs translate the CISC instructions i...
Ciji Isen, Lizy K. John, Eugene John
CISC
2009
Springer
154views Cryptology» more  CISC 2009»
14 years 10 months ago
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication
In a selective private function evaluation (SPFE) protocol, the client privately computes some predefined function on his own input and on m out of server's n database element...
Helger Lipmaa, Bingsheng Zhang
87
Voted
CISC
2009
Springer
185views Cryptology» more  CISC 2009»
14 years 10 months ago
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages
In [10], Buchmann, Pyshkin and Weinmann have described two families of Feistel and SPN block ciphers called Flurry and Curry respectively. These two families of ciphers are fully p...
Jean-Charles Faugère, Ludovic Perret
CISC
2009
Springer
186views Cryptology» more  CISC 2009»
14 years 10 months ago
Hardware Framework for the Rabbit Stream Cipher
Rabbit is a software-oriented synchronous stream cipher with very strong security properties and support for 128-bit keys. Rabbit is part of the European Union's eSTREAM portf...
Deian Stefan