Sciweavers

555 search results - page 42 / 111
» From ABZ to Cryptography
Sort
View
SODA
2010
ACM
200views Algorithms» more  SODA 2010»
14 years 7 months ago
Algorithms for ray class groups and Hilbert class fields
This paper analyzes the complexity of problems from class field theory. Class field theory can be used to show the existence of infinite families of number fields with constant ro...
Sean Hallgren, Kirsten Eisentraeger
FC
2009
Springer
121views Cryptology» more  FC 2009»
14 years 4 months ago
Achieving Privacy in a Federated Identity Management System
Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domai...
Susan Landau, Hubert Lê Van Gông, Robi...
FDTC
2009
Springer
100views Cryptology» more  FDTC 2009»
14 years 4 months ago
Using Optical Emission Analysis for Estimating Contribution to Power Analysis
—This paper shows that optical emissions from an operating chip have a good correlation with power traces and can therefore be used to estimate the contribution of different area...
Sergei P. Skorobogatov
ICASSP
2008
IEEE
14 years 4 months ago
Cryptographic measures in information hiding
Recent information hiding schemes are scrutinized in terms of their cryptographic performance. We establish conditions under which the key equivocation function is optimal for the...
Phillip A. Regalia
ACNS
2008
Springer
172views Cryptology» more  ACNS 2008»
14 years 4 months ago
Traceable Privacy of Recent Provably-Secure RFID Protocols
Abstract. One of the main challenges in RFIDs is the design of privacypreserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authen...
Khaled Ouafi, Raphael C.-W. Phan