Sciweavers

125 search results - page 21 / 25
» On the Performance of Hyperelliptic Cryptosystems
Sort
View
CHES
2005
Springer
149views Cryptology» more  CHES 2005»
14 years 2 months ago
Resistance of Randomized Projective Coordinates Against Power Analysis
Embedded devices implementing cryptographic services are the result of a trade-off between cost, performance and security. Aside from flaws in the protocols and the algorithms us...
William Dupuy, Sébastien Kunz-Jacques
CCS
2006
ACM
14 years 9 days ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
CCS
2007
ACM
14 years 2 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor
SBCCI
2006
ACM
124views VLSI» more  SBCCI 2006»
14 years 2 months ago
A cryptography core tolerant to DFA fault attacks
This work describes a hardware approach for the concurrent fault detection and error correction in a cryptographic core. It has been shown in the literature that transient faults ...
Carlos Roberto Moratelli, Érika F. Cota, Ma...
FC
1999
Springer
160views Cryptology» more  FC 1999»
14 years 26 days ago
Anonymous Authentication of Membership in Dynamic Groups
Abstract. We present a series of protocols for authenticating an individual’s membership in a group without revealing that individual’s identity and without restricting how the...
Stuart E. Schechter, Todd Parnell, Alexander J. Ha...