Sciweavers

201 search results - page 28 / 41
» Security Properties of Typed Applets
Sort
View
JLP
2010
142views more  JLP 2010»
14 years 10 months ago
Relational bytecode correlations
We present a calculus for tracking equality relationships between values through pairs of bytecode programs. The calculus may serve as a certification mechanism for noninterferenc...
Lennart Beringer
112
Voted
OOPSLA
2010
Springer
15 years 1 months ago
MetaFJig: a meta-circular composition language for Java-like classes
We propose a Java-like language where class denitions are rst class values, hence new classes can be derived from existing, rather than by a xed mechanism like inheritance, by e...
Marco Servetto, Elena Zucca
111
Voted
PET
2004
Springer
15 years 8 months ago
Reputable Mix Networks
We define a new type of mix network that offers a reduced form of robustness: the mixnet can prove that every message it outputs corresponds to an input submitted by a player wit...
Philippe Golle
119
Voted
CTRSA
2010
Springer
152views Cryptology» more  CTRSA 2010»
15 years 6 months ago
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryp...
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar,...
164
Voted
ITIIS
2010
200views more  ITIIS 2010»
14 years 10 months ago
New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups
Anonymous hierarchical identity based encryption (HIBE) is an extension of identity based encryption (IBE) that can use an arbitrary string like an e-mail address for a public key...
Kwangsu Lee, Dong Hoon Lee