Sciweavers

5722 search results - page 75 / 1145
» Security Function Interactions
Sort
View
FSE
2008
Springer
166views Cryptology» more  FSE 2008»
13 years 10 months ago
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation
Hash functions are an important building block in almost all security applications. In the past few years, there have been major advances in the cryptanalysis of hash functions, es...
Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee
CGI
1997
IEEE
14 years 1 months ago
The Visorama System: A Functional Overview of a New Virtual Reality Environment
The recent developments in image-based rendering have enabled a representation of virtual environments based on a simulation of panoramas, which we call virtual panoramas. Current...
André Matos, Luiz Velho, Jonas Gomes, Andr&...
HCI
2009
13 years 6 months ago
Use Cases Functionality of the OASIS HCI
Abstract. Within OASIS, a set of detailed Use Cases have been developed, after capturing the specific needs of elderly users on the use and acquisition of services for the support ...
Maria Panou, Evangelos Bekiaris, Maria Fernanda Ca...
CRYPTO
2006
Springer
89views Cryptology» more  CRYPTO 2006»
14 years 14 days ago
Oblivious Transfer and Linear Functions
Abstract. We study unconditionally secure 1-out-of-2 Oblivious Transfer (1-2 OT). We first point out that a standard security requirement for 1-2 OT of bits, namely that the receiv...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
ISW
2009
Springer
14 years 3 months ago
Robust Authentication Using Physically Unclonable Functions
Abstract. In this work we utilize a physically unclonable function (PUF) to improve resilience of authentication protocols to various types of compromise. As an example application...
Keith B. Frikken, Marina Blanton, Mikhail J. Atall...