Sciweavers

319 search results - page 3 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
AC
1997
Springer
14 years 1 months ago
Cryptographic Primitives for Information Authentication - State of the Art
This paper describes the state of the art for cryptographic primitives that are used for protecting the authenticity of information: cryptographic hash functions and digital signat...
Bart Preneel
DAM
2008
70views more  DAM 2008»
13 years 10 months ago
Pairings for cryptographers
Many research papers in pairing based cryptography treat pairings as a "black box". These papers build cryptographic schemes making use of various properties of pairings....
Steven D. Galbraith, Kenneth G. Paterson, Nigel P....
ICSE
2009
IEEE-ACM
13 years 7 months ago
Software Assumptions Failure Tolerance: Role, Strategies, and Visions
Abstract. At our behest or otherwise, while our software is being executed, a huge variety of design assumptions is continuously matched with the truth of the current condition. Wh...
Vincenzo De Florio
DSN
2007
IEEE
14 years 4 months ago
Protecting Cryptographic Keys from Memory Disclosure Attacks
Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that ...
Keith Harrison, Shouhuai Xu
INFOCOM
2010
IEEE
13 years 8 months ago
Network Positioning from the Edge - An Empirical Study of the Effectiveness of Network Positioning in P2P Systems
—Network positioning systems provide an important service to large-scale P2P systems, potentially enabling clients to achieve higher performance, reduce cross-ISP traffic and im...
David R. Choffnes, Mario Sanchez, Fabian E. Bustam...