Sciweavers

773 search results - page 6 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
MATA
2004
Springer
113views Communications» more  MATA 2004»
14 years 3 months ago
PEARL: A PErformance evaluAtor of cRyptographic aLgorithms for Mobile Devices
Abstract. Limited computational power imposes new challenges during the implementation of security and privacy solutions for mobile devices. The choice for the most appropriate cry...
José Bringel Filho, Windson Viana, Rossana ...
TCC
2004
Springer
96views Cryptology» more  TCC 2004»
14 years 3 months ago
On the Notion of Pseudo-Free Groups
We explore the notion of a pseudo-free group, first introduced by Hohenberger [Hoh03], and provide an alternative stronger definition. We show that if Z∗ n is a pseudo-free abe...
Ronald L. Rivest
SAT
2009
Springer
126views Hardware» more  SAT 2009»
14 years 4 months ago
Extending SAT Solvers to Cryptographic Problems
Cryptography ensures the confidentiality and authenticity of information but often relies on unproven assumptions. SAT solvers are a powerful tool to test the hardness of certain ...
Mate Soos, Karsten Nohl, Claude Castelluccia
DSN
2007
IEEE
14 years 4 months ago
Protecting Cryptographic Keys from Memory Disclosure Attacks
Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that ...
Keith Harrison, Shouhuai Xu
AC
1997
Springer
14 years 1 months ago
Cryptographic Primitives for Information Authentication - State of the Art
This paper describes the state of the art for cryptographic primitives that are used for protecting the authenticity of information: cryptographic hash functions and digital signat...
Bart Preneel