Sciweavers

5722 search results - page 64 / 1145
» Security Function Interactions
Sort
View
ACISP
2000
Springer
14 years 1 months ago
Two-Stage Optimisation in the Design of Boolean Functions
This paper shows how suitable choice of cost function can significantly affect the power of optimisation methods for the synthesising of Boolean functions. In particular we show ...
John A. Clark, Jeremy Jacob
MOC
2010
13 years 3 months ago
Analysis of spectral approximations using prolate spheroidal wave functions
Abstract. In this paper, the approximation properties of the prolate spheroidal wave functions of order zero (PSWFs) are studied, and a set of optimal error estimates are derived f...
Li-lian Wang
EUROCRYPT
2004
Springer
14 years 2 months ago
Black-Box Composition Does Not Imply Adaptive Security
In trying to provide formal evidence that composition has security increasing properties, we ask if the composition of non-adaptively secure permutation generators necessarily pro...
Steven Myers
DEXAW
2009
IEEE
93views Database» more  DEXAW 2009»
14 years 19 days ago
The Secure Pipes and Filters Pattern
Many applications process or transform a stream of data. Such applications are organized as a sequence of different stages, which may be independent enough to be simultaneously car...
Eduardo B. Fernandez, Jorge L. Ortega-Arjona
CRYPTO
2010
Springer
151views Cryptology» more  CRYPTO 2010»
13 years 9 months ago
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
Abstract. A cryptographic primitive is leakage-resilient, if it remains secure even if an adversary can learn a bounded amount of arbitrary information about the computation with e...
Yevgeniy Dodis, Krzysztof Pietrzak