Sciweavers

1005 search results - page 47 / 201
» Practical Secure Function Evaluation
Sort
View
ACSAC
2001
IEEE
14 years 15 days ago
Verifiable Identifiers in Middleware Security
fies a number of issues related to security information r semantics on different layers of abstraction. In particular it is difficult to express caller and target accurately in the...
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
ICANN
2010
Springer
13 years 10 months ago
Evaluation of Pooling Operations in Convolutional Architectures for Object Recognition
Abstract. A common practice to gain invariant features in object recognition models is to aggregate multiple low-level features over a small neighborhood. However, the differences ...
Dominik Scherer, Andreas Müller, Sven Behnke
CRYPTO
2006
Springer
88views Cryptology» more  CRYPTO 2006»
14 years 17 days ago
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions
Let H1, H2 be two hash functions. We wish to construct a new hash function H that is collision resistant if at least one of H1 or H2 is collision resistant. Concatenating the outpu...
Dan Boneh, Xavier Boyen
INDOCRYPT
2010
Springer
13 years 6 months ago
Attack on a Higher-Order Masking of the AES Based on Homographic Functions
In the recent years, Higher-order Side Channel attacks have been widely investigated. In particular, 2nd-order DPA have been improved and successfully applied to break several mask...
Emmanuel Prouff, Thomas Roche
EUROCRYPT
2011
Springer
13 years 10 days ago
Homomorphic Signatures for Polynomial Functions
We construct the first homomorphic signature scheme that is capable of evaluating multivariate polynomials on signed data. Given the public key and a signed data set, there is an...
Dan Boneh, David Mandell Freeman