Sciweavers

488 search results - page 79 / 98
» Policy-Based Cryptography and Applications
Sort
View
ANTS
2006
Springer
78views Algorithms» more  ANTS 2006»
14 years 6 days ago
Hidden Pairings and Trapdoor DDH Groups
This paper suggests a new building block for cryptographic protocols and gives two instantiations of it. The concept is to generate two descriptions of the same group: a public des...
Alexander W. Dent, Steven D. Galbraith
EUROCRYPT
2006
Springer
14 years 3 days ago
Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects
The Isomorphism of Polynomials (IP) [28], which is the main concern of this paper, originally corresponds to the problem of recovering the secret key of a C scheme [26]. Besides, t...
Jean-Charles Faugère, Ludovic Perret
ACSAC
2001
IEEE
14 years 3 days ago
Securing Web Servers against Insider Attack
Too often, "security of Web transactions" reduces to "encryption of the channel"--and neglects to address what happens at the server on the other end. This ove...
Shan Jiang, Sean W. Smith, Kazuhiro Minami
EUROCRYPT
2000
Springer
14 years 1 days ago
Fair Encryption of RSA Keys
Cryptography is more and more concerned with elaborate protocols involving many participants. In some cases, it is crucial to be sure that players behave fairly especially when the...
Guillaume Poupard, Jacques Stern
EUROGP
2010
Springer
160views Optimization» more  EUROGP 2010»
13 years 11 months ago
Fine-Grained Timing Using Genetic Programming
In previous work, we have demonstrated that it is possible to use Genetic Programming to minimise the resource consumption of software, such as its power consumption or execution t...
David Robert White, Juan E. Tapiador, Julio C&eacu...