Sciweavers

923 search results - page 92 / 185
» Improved Slide Attacks
Sort
View
HPCA
2008
IEEE
16 years 4 months ago
Single-level integrity and confidentiality protection for distributed shared memory multiprocessors
Multiprocessor computer systems are currently widely used in commercial settings to run critical applications. These applications often operate on sensitive data such as customer ...
Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milo...
ESSOS
2010
Springer
16 years 27 days ago
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests
Protecting users in the ubiquitous online world is becoming more and more important, as shown by web application security – or the lack thereof – making the mainstream news. On...
Philippe De Ryck, Lieven Desmet, Thomas Heyman, Fr...
PROVSEC
2009
Springer
15 years 10 months ago
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
Signcryption is a cryptographic primitive that provides authentication and confidentiality simultaneously in a single logical step. It is often required that multiple senders have...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
127
Voted
SACRYPT
2009
Springer
155views Cryptology» more  SACRYPT 2009»
15 years 10 months ago
Practical Collisions for SHAMATA-256
In this paper, we present a collision attack on the SHA-3 submission SHAMATA. SHAMATA is a stream cipher-like hash function design with components of the AES, and it is one of the ...
Sebastiaan Indesteege, Florian Mendel, Bart Prenee...
INFOCOM
2008
IEEE
15 years 10 months ago
ALPACAS: A Large-Scale Privacy-Aware Collaborative Anti-Spam System
— While the concept of collaboration provides a natural defense against massive spam emails directed at large numbers of recipients, designing effective collaborative anti-spam s...
Zhenyu Zhong, Lakshmish Ramaswamy, Kang Li