Sciweavers

1825 search results - page 341 / 365
» Cryptographic Securities Exchanges
Sort
View
CHES
2010
Springer
187views Cryptology» more  CHES 2010»
13 years 9 months ago
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version)
The power of side-channel leakage attacks on cryptographic implementations is evident. Today's practical defenses are typically attack-specific countermeasures against certain...
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Re...
CORR
2006
Springer
169views Education» more  CORR 2006»
13 years 8 months ago
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model
We consider a type of zero-knowledge protocols that are of interest for their practical applications within networks like the Internet: efficient zero-knowledge arguments of knowl...
Yi Deng, Giovanni Di Crescenzo, Dongdai Lin
MOC
2010
13 years 3 months ago
The number field sieve for integers of low weight
We define the weight of an integer N to be the smallest w such that N can be represented as w i=1 i2ci , with 1,..., w{1,-1}. Since arithmetic modulo a prime of low weight is parti...
Oliver Schirokauer
TDP
2010
166views more  TDP 2010»
13 years 3 months ago
Communication-Efficient Privacy-Preserving Clustering
The ability to store vast quantities of data and the emergence of high speed networking have led to intense interest in distributed data mining. However, privacy concerns, as well ...
Geetha Jagannathan, Krishnan Pillaipakkamnatt, Reb...
CORR
2011
Springer
156views Education» more  CORR 2011»
13 years 6 days ago
Design of Transport Layer Based Hybrid Covert Channel Detection Engine
: Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most o...
Anjan K., Jibi Abraham, Mamatha Jadhav V.