Sciweavers

356 search results - page 2 / 72
» Cryptography in the Bounded-Quantum-Storage Model
Sort
View
IACR
2011
73views more  IACR 2011»
14 years 3 months ago
Secure Authentication from a Weak Key, Without Leaking Information
We study the problem of authentication based on a weak key in the information-theoretic setting. A key is weak if its min-entropy is an arbitrary small fraction of its bit length. ...
Niek J. Bouman, Serge Fehr
INFORMATICALT
2010
170views more  INFORMATICALT 2010»
15 years 1 months ago
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original sign...
Hu Xiong, Fagen Li, Zhiguang Qin
ACSAC
2001
IEEE
15 years 7 months ago
A JCA-Based Implementation Framework for Threshold Cryptography
The Java Cryptography Architecture, JCA in short, was created to allow JCA-compliant cryptography providers to be plugged into a JCA-aware application at run time. This configurab...
Yih Huang, David Rine, Xunhua Wang
100
Voted
CHES
2007
Springer
131views Cryptology» more  CHES 2007»
15 years 10 months ago
Gaussian Mixture Models for Higher-Order Side Channel Analysis
Kerstin Lemke-Rust, Christof Paar
97
Voted
FSE
2007
Springer
140views Cryptology» more  FSE 2007»
15 years 10 months ago
An Analytical Model for Time-Driven Cache Attacks
Kris Tiri, Onur Aciiçmez, Michael Neve, Fle...