Sciweavers

158 search results - page 10 / 32
» Analysis of improved signcryption scheme with key privacy
Sort
View
ACISP
2005
Springer
14 years 3 months ago
Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS
Abstract. Multivariate public-key cryptosystems (sometimes polynomial-based PKC’s or just multivariates) handle polynomials of many variables over relatively small fields instea...
Bo-Yin Yang, Jiun-Ming Chen
WISA
2010
Springer
13 years 7 months ago
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations
In this paper we present two attacks that exploit cache events, which are visible in some side channel, to derive a secret key used in an implementation of AES. The first is an imp...
Jean-François Gallais, Ilya Kizhvatov, Mich...
CORR
2008
Springer
135views Education» more  CORR 2008»
13 years 10 months ago
Crossing Borders: Security and Privacy Issues of the European e-Passport
The first generation of European e-passports will be issued in 2006. We discuss how borders are crossed regarding the security and privacy erosion of the proposed schemes, and show...
Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs,...
AAAI
2006
13 years 11 months ago
Analysis of Privacy Loss in Distributed Constraint Optimization
Distributed Constraint Optimization (DCOP) is rapidly emerging as a prominent technique for multiagent coordination. However, despite agent privacy being a key motivation for appl...
Rachel Greenstadt, Jonathan P. Pearce, Milind Tamb...
INFOCOM
2007
IEEE
14 years 4 months ago
pDCS: Security and Privacy Support for Data-Centric Sensor Networks
—The demand for efficient data dissemination/access techniques to find the relevant data from within a sensor network has led to the development of data-centric sensor networks...
Min Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao