Sciweavers

56 search results - page 10 / 12
» On the Practical Security of Inner Product Functional Encryp...
Sort
View
JMIV
2007
156views more  JMIV 2007»
13 years 7 months ago
Using the Shape Gradient for Active Contour Segmentation: from the Continuous to the Discrete Formulation
A variational approach to image or video segmentation consists in defining an energy depending on local or global image characteristics, the minimum of which being reached for ob...
Eric Debreuve, Muriel Gastaud, Michel Barlaud, Gil...
IACR
2011
124views more  IACR 2011»
12 years 7 months ago
Efficient Multicast Key Distribution Using HOWF-based Access Control Structures
— Both broadcast encryption (BE) protocols and multicast key distribution (MKD) protocols try to solve the same problem of private group communication. For the first time, we dis...
Jing Liu, Qiong Huang, Bo Yang
CCS
2008
ACM
13 years 9 months ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
13 years 11 months ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...
DATE
2007
IEEE
80views Hardware» more  DATE 2007»
14 years 1 months ago
Engineering trust with semantic guardians
The ability to guarantee the functional correctness of digital integrated circuits and, in particular, complex microprocessors, is a key task in the production of secure and trust...
Ilya Wagner, Valeria Bertacco