Sciweavers

146 search results - page 13 / 30
» Homomorphic encryption from codes
Sort
View
CJ
2006
123views more  CJ 2006»
13 years 7 months ago
Unconditionally Secure Anonymous Encryption and Group Authentication
Anonymous channels or similar techniques that can achieve sender's anonymity play important roles in many applications. However, they will be meaningless if cryptographic prim...
Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, H...
ISCAPDCS
2004
13 years 9 months ago
Semantic Encryption Transformation Scheme
We present a scheme to protect mobile code from malicious hosts. We propose a transformation scheme that changes the semantics of a program using pseudorandom I/O scrambling, cond...
Willard Thompson, Alec Yasinsac, J. Todd McDonald
CARDIS
2006
Springer
146views Hardware» more  CARDIS 2006»
13 years 11 months ago
SEA: A Scalable Encryption Algorithm for Small Embedded Applications
Most present symmetric encryption algorithms result from a tradeoff between implementation cost and resulting performances. In addition, they generally aim to be implemented effici...
François-Xavier Standaert, Gilles Piret, Ne...
SP
2009
IEEE
14 years 2 months ago
Privacy Weaknesses in Biometric Sketches
The increasing use of biometrics has given rise to new privacy concerns. Biometric encryption systems have been proposed in order to alleviate such concerns: rather than comparing...
Koen Simoens, Pim Tuyls, Bart Preneel
AVBPA
2005
Springer
275views Biometrics» more  AVBPA 2005»
14 years 1 months ago
Vulnerabilities in Biometric Encryption Systems
Abstract. The goal of a biometric encryption system is to embed a secret into a biometric template in a way that can only be decrypted with a biometric image from the enroled perso...
Andy Adler