Sciweavers

981 search results - page 58 / 197
» Advanced Encryption Standard
Sort
View
BMCBI
2006
190views more  BMCBI 2006»
13 years 9 months ago
VANTED: A system for advanced data analysis and visualization in the context of biological networks
Background: Recent advances with high-throughput methods in life-science research have increased the need for automatized data analysis and visual exploration techniques. Sophisti...
Björn H. Junker, Christian Klukas, Falk Schre...
JOC
2010
124views more  JOC 2010»
13 years 7 months ago
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
We present a new encryption scheme which is secure against adaptive chosenciphertext attack (or CCA2-secure) in the standard model (i.e. without the use of random oracle). Our sch...
Yvo Desmedt, Rosario Gennaro, Kaoru Kurosawa, Vict...
SCN
2010
Springer
144views Communications» more  SCN 2010»
13 years 7 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng
ASIACRYPT
2004
Springer
14 years 2 months ago
Secret Handshakes from CA-Oblivious Encryption
Secret handshakes were recently introduced [BDS+ 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member ca...
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudi...
EURODAC
1994
IEEE
211views VHDL» more  EURODAC 1994»
14 years 1 months ago
Advanced simulation and modeling techniques for hardware quality verification of digital systems
synchronisation also play a fundamental role in overall system robustness. ElectroMagnetic Compatibility (EMC) and ElectroMagnetic Interference (EMI) issues also have to be conside...
S. Forno, Stephen Rochel