Sciweavers

217 search results - page 22 / 44
» Selecting Cryptographic Key Sizes
Sort
View
ITIIS
2010
200views more  ITIIS 2010»
13 years 2 months ago
New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups
Anonymous hierarchical identity based encryption (HIBE) is an extension of identity based encryption (IBE) that can use an arbitrary string like an e-mail address for a public key...
Kwangsu Lee, Dong Hoon Lee
ICASSP
2009
IEEE
13 years 5 months ago
A MIMO-OFDM channel estimation scheme utilizing complementary sequences
We present a pilot-assisted method for estimating the frequency selective channel in a MIMO-OFDM system. The pilot sequence is designed using the DFT of the Golay complementary se...
Tariq R. Qureshi, Michael D. Zoltowski, A. Robert ...
CHI
2007
ACM
14 years 8 months ago
"Jump and refine" for rapid pointing on mobile phones
Standard input devices for mobile phones are directional keys and discrete thumb-joysticks. These devices are dedicated to the discrete GUIs of the phones (eg. scroll lists and sm...
Martin Hachet, Joachim Pouderoux, Florence Tyndiuk...
TCC
2009
Springer
167views Cryptology» more  TCC 2009»
14 years 8 months ago
Simultaneous Hardcore Bits and Cryptography against Memory Attacks
This paper considers two questions in cryptography. Cryptography Secure Against Memory Attacks. A particularly devastating side-channel attack against cryptosystems, termed the &qu...
Adi Akavia, Shafi Goldwasser, Vinod Vaikuntanathan
DRM
2007
Springer
14 years 2 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen