Sciweavers

773 search results - page 25 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
ANTS
2006
Springer
78views Algorithms» more  ANTS 2006»
14 years 1 months ago
Hidden Pairings and Trapdoor DDH Groups
This paper suggests a new building block for cryptographic protocols and gives two instantiations of it. The concept is to generate two descriptions of the same group: a public des...
Alexander W. Dent, Steven D. Galbraith
EUROCRYPT
2006
Springer
14 years 1 months ago
Private Circuits II: Keeping Secrets in Tamperable Circuits
Abstract. Motivated by the problem of protecting cryptographic hardware, we continue the investigation of private circuits initiated in [16]. In this work, our aim is to construct ...
Yuval Ishai, Manoj Prabhakaran, Amit Sahai, David ...
USS
2008
14 years 1 hour ago
Lest We Remember: Cold Boot Attacks on Encryption Keys
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for several seconds after power is lost, even at room temperature and even if removed fro...
J. Alex Halderman, Seth D. Schoen, Nadia Heninger,...
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
13 years 1 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
ICPR
2002
IEEE
14 years 10 months ago
Emotion Recognition Using a Cauchy Naive Bayes Classifier
Recognizing human facial expression and emotion by computer is an interesting and challenging problem. In this paper we propose a method for recognizing emotions through facial ex...
Nicu Sebe, Michael S. Lew, Ira Cohen, Ashutosh Gar...