Sciweavers

488 search results - page 20 / 98
» Policy-Based Cryptography and Applications
Sort
View
CCS
2010
ACM
14 years 2 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
SAMOS
2007
Springer
14 years 1 months ago
A Side-channel Attack Resistant Programmable PKC Coprocessor for Embedded Applications
—This paper describes the design of a programmable coprocessor for Public Key Cryptography (PKC) on an FPGA. The implementation provides a very broad range of functions together ...
Nele Mentens, Kazuo Sakiyama, Lejla Batina, Bart P...
CODASPY
2012
12 years 3 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 7 months ago
Divisibility, Smoothness and Cryptographic Applications
This paper deals with products of moderate-size primes, familiarly known as smooth numbers. Smooth numbers play an crucial role in information theory, signal processing and crypto...
David Naccache, Igor Shparlinski
CRYPTO
2008
Springer
109views Cryptology» more  CRYPTO 2008»
13 years 9 months ago
Adaptive One-Way Functions and Applications
Abstract. We introduce new and general complexity theoretic hardumptions. These assumptions abstract out concrete properties of a random oracle and are significantly stronger than ...
Omkant Pandey, Rafael Pass, Vinod Vaikuntanathan