Sciweavers

74 search results - page 5 / 15
» Multi-instance Security and Its Application to Password-Base...
Sort
View
PDCAT
2004
Springer
14 years 29 days ago
GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids
Today’s cryptanalysis on symmetric key cryptography is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state. However, this leads an inc...
Agus Setiawan, David Adiutama, Julius Liman, Aksha...
CHES
2007
Springer
107views Cryptology» more  CHES 2007»
14 years 1 months ago
Secret External Encodings Do Not Prevent Transient Fault Analysis
Contrarily to Kerckhoffs’ principle, many applications of today’s cryptography still adopt the security by obscurity paradigm. Furthermore, in order to rely on its proven or e...
Christophe Clavier
TCC
2004
Springer
147views Cryptology» more  TCC 2004»
14 years 29 days ago
Computational Collapse of Quantum State with Application to Oblivious Transfer
Quantum 2-party cryptography differs from its classical counterpart in at least one important way: Given blak-box access to a perfect commitment scheme there exists a secure 1−2...
Claude Crépeau, Paul Dumais, Dominic Mayers...
BPM
2003
Springer
102views Business» more  BPM 2003»
14 years 25 days ago
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
Peter Lory
JOC
2011
104views more  JOC 2011»
12 years 10 months ago
On the Security of Oscillator-Based Random Number Generators
Physical random number generators (a.k.a. TRNGs) appear to be critical components of many cryptographic systems. Yet, such building blocks are still too seldom provided with a form...
Mathieu Baudet, David Lubicz, Julien Micolod, Andr...