Sciweavers

1005 search results - page 32 / 201
» Practical Secure Function Evaluation
Sort
View
IJCAI
1997
13 years 10 months ago
Is Nonparametric Learning Practical in Very High Dimensional Spaces?
Many of the challenges faced by the £eld of Computational Intelligence in building intelligent agents, involve determining mappings between numerous and varied sensor inputs and ...
Gregory Z. Grudic, Peter D. Lawrence
COMSWARE
2008
IEEE
14 years 3 months ago
On implementing security at the transport layer
— We design a framework that implements security at the TCP layer to meet the necessity for a practical and truly end-to-end security solution. We call our framework TCPsec. TCPs...
Swaminathan Pichumani, Sneha Kumar Kasera
FSE
2010
Springer
153views Cryptology» more  FSE 2010»
14 years 1 months ago
Rotational Cryptanalysis of ARX
In this paper we analyze the security of systems based on modular additions, rotations, and XORs (ARX systems). We provide both theoretical support for their security and practical...
Dmitry Khovratovich, Ivica Nikolic
ASIACRYPT
2000
Springer
14 years 1 months ago
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques
Rather than use a shared key directly to cryptographically process (e.g. encrypt or authenticate) data one can use it as a master key to derive subkeys, and use the subkeys for the...
Michel Abdalla, Mihir Bellare
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay