Sciweavers

1005 search results - page 47 / 201
» Practical Secure Function Evaluation
Sort
View
110
Voted
ACSAC
2001
IEEE
15 years 6 months ago
Verifiable Identifiers in Middleware Security
fies a number of issues related to security information r semantics on different layers of abstraction. In particular it is difficult to express caller and target accurately in the...
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
ICANN
2010
Springer
15 years 3 months ago
Evaluation of Pooling Operations in Convolutional Architectures for Object Recognition
Abstract. A common practice to gain invariant features in object recognition models is to aggregate multiple low-level features over a small neighborhood. However, the differences ...
Dominik Scherer, Andreas Müller, Sven Behnke
CRYPTO
2006
Springer
88views Cryptology» more  CRYPTO 2006»
15 years 6 months ago
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions
Let H1, H2 be two hash functions. We wish to construct a new hash function H that is collision resistant if at least one of H1 or H2 is collision resistant. Concatenating the outpu...
Dan Boneh, Xavier Boyen
INDOCRYPT
2010
Springer
15 years 8 days ago
Attack on a Higher-Order Masking of the AES Based on Homographic Functions
In the recent years, Higher-order Side Channel attacks have been widely investigated. In particular, 2nd-order DPA have been improved and successfully applied to break several mask...
Emmanuel Prouff, Thomas Roche
EUROCRYPT
2011
Springer
14 years 5 months ago
Homomorphic Signatures for Polynomial Functions
We construct the first homomorphic signature scheme that is capable of evaluating multivariate polynomials on signed data. Given the public key and a signed data set, there is an...
Dan Boneh, David Mandell Freeman