Sciweavers

81 search results - page 15 / 17
» Improving Fast Algebraic Attacks
Sort
View
ISCA
2006
IEEE
154views Hardware» more  ISCA 2006»
14 years 1 months ago
An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors
This paper presents a high-availability system architecture called INDRA — an INtegrated framework for Dependable and Revivable Architecture that enhances a multicore processor ...
Weidong Shi, Hsien-Hsin S. Lee, Laura Falk, Mrinmo...
RFIDSEC
2010
13 years 5 months ago
Optimal Security Limits of RFID Distance Bounding Protocols
Abstract. In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two s...
Orhun Kara, Süleyman Kardas, Muhammed Ali Bin...
ICDE
2005
IEEE
124views Database» more  ICDE 2005»
14 years 8 months ago
Design, Implementation, and Evaluation of a Repairable Database Management System
Although conventional database management systems are designed to tolerate hardware and to a lesser extent even software errors, they cannot protect themselves against syntactical...
Tzi-cker Chiueh, Dhruv Pilania
FSE
1998
Springer
137views Cryptology» more  FSE 1998»
13 years 11 months ago
Differential Cryptanalysis of the ICE Encryption Algorithm
ICE is a 64-bit block cipher presented at the Fast Software Encryption Workshop in January 1997. It introduced the concept of a keyed permutation to improve the resistance against ...
Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen
CRYPTO
2001
Springer
113views Cryptology» more  CRYPTO 2001»
13 years 12 months ago
OAEP Reconsidered
The OAEP encryption scheme was introduced by Bellare and Rogaway at Eurocrypt ’94. It converts any trapdoor permutation scheme into a public-key encryption scheme. OAEP is widel...
Victor Shoup