Sciweavers

930 search results - page 104 / 186
» A Universal Encryption Standard
Sort
View
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 4 months ago
A Very Compact "Perfectly Masked" S-Box for AES
Implementations of the Advanced Encryption Standard (AES), including hardware applications with limited resources (e.g., smart cards), may be vulnerable to ā€œside-channel attacksā...
D. Canright, Lejla Batina
CCS
2007
ACM
14 years 4 months ago
Uclinux: a linux security module for trusted-computing-based usage controls enforcement
Usage controls allow the distributor of some information to limit how recipients of that information may use it. The Trusted Computing Group has standardized Trusted Platform Modu...
David Kyle, José Carlos Brustoloni
DRM
2007
Springer
14 years 4 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric ļ¬ngerprint hashes, or summaries of information contained in human ļ¬ngerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
LPAR
2007
Springer
14 years 4 months ago
Deciding Knowledge in Security Protocols for Monoidal Equational Theories
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Véronique Cortier, Stéphanie Delaune
TCC
2007
Springer
96views Cryptology» more  TCC 2007»
14 years 4 months ago
Securely Obfuscating Re-encryption
Abstract. We present the ļ¬rst positive obfuscation result for a traditional cryptographic functionality. This positive result stands in contrast to well-known negative impossibil...
Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, V...