Sciweavers

281 search results - page 29 / 57
» Non-black-box Techniques in Cryptography
Sort
View
ACNS
2005
Springer
81views Cryptology» more  ACNS 2005»
14 years 3 months ago
Searching for High-Value Rare Events with Uncheatable Grid Computing
Abstract. High-value rare-event searching is arguably the most natural application of grid computing, where computational tasks are distributed to a large collection of clients (wh...
Wenliang Du, Michael T. Goodrich
ACNS
2005
Springer
124views Cryptology» more  ACNS 2005»
14 years 3 months ago
Building Reliable Mix Networks with Fair Exchange
In this paper we present techniques by which each mix in a mix network can be paid for its services by message senders, in a way that ensures fairness and without sacrificing anon...
Michael K. Reiter, XiaoFeng Wang, Matthew Wright
CHES
2005
Springer
129views Cryptology» more  CHES 2005»
14 years 3 months ago
Prototype IC with WDDL and Differential Routing - DPA Resistance Assessment
Wave dynamic differential logic combined with differential routing is a working, practical technique to thwart side-channel power attacks. Measurement-based experimental results sh...
Kris Tiri, David Hwang, Alireza Hodjat, Bo-Cheng L...
EGOV
2005
Springer
14 years 3 months ago
Electronic Voting: An All-Purpose Platform
It is generally considered that a key component of electronic government in the future will be electronic voting, as a means of facilitating the participation of citizens in electi...
Ricardo André Costa, Mário Jorge Lei...
HIP
2005
Springer
124views Cryptology» more  HIP 2005»
14 years 3 months ago
How Much Assurance Does a PIN Provide?
Abstract. We would like to quantify the assurance contained in an authentication secret. For instance, how much assurance does a customer convey to a bank by revealing that his Per...
Jon Louis Bentley, Colin Mallows