Sciweavers

1562 search results - page 103 / 313
» Mathematics, Cryptology, Security
Sort
View
ICISC
2009
138views Cryptology» more  ICISC 2009»
13 years 6 months ago
Efficient Certificateless KEM in the Standard Model
Abstract. We give a direct construction of a certificateless key encapsulation mechanism (KEM) in the standard model that is more efficient than the generic constructions proposed ...
Georg Lippold, Colin Boyd, Juan Manuel Gonzá...
NAA
2000
Springer
131views Mathematics» more  NAA 2000»
13 years 11 months ago
Parallel Monte Carlo Methods for Derivative Security Pricing
Abstract. Monte Carlo (MC) methods have proved to be flexible, robust and very useful techniques in computational finance. Several studies have investigated ways to achieve greater...
Giorgio Pauletto
ASIACRYPT
2009
Springer
14 years 2 months ago
Cascade Encryption Revisited
Abstract. The security of cascade blockcipher encryption is an important and well-studied problem in theoretical cryptography with practical implications. It is well-known that dou...
Peter Gazi, Ueli M. Maurer
MYCRYPT
2005
Springer
248views Cryptology» more  MYCRYPT 2005»
14 years 1 months ago
A Family of Fast Syndrome Based Cryptographic Hash Functions
Recently, some collisions have been exposed for a variety of cryptographic hash functions [20,21] including some of the most widely used today. Many other hash functions using simi...
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
CHES
2010
Springer
210views Cryptology» more  CHES 2010»
13 years 9 months ago
Flash Memory 'Bumping' Attacks
This paper introduces a new class of optical fault injection attacks called bumping attacks. These attacks are aimed at data extraction from secure embedded memory, which usually s...
Sergei Skorobogatov