Sciweavers

2416 search results - page 13 / 484
» The design and implementation of typed scheme
Sort
View
IMA
2001
Springer
79views Cryptology» more  IMA 2001»
14 years 1 months ago
On Rabin-Type Signatures
Abstract. This paper specializes the signature forgery by Coron, Naccache and Stern (1999) to Rabin-type systems. We present a variation in which the adversary may derive the priva...
Marc Joye, Jean-Jacques Quisquater
SIBGRAPI
1999
IEEE
14 years 26 days ago
Developing Morphological Building Blocks: From Design to Implementation
Abstract. Mathematical morphology has become a widely used technique for image processing and computer vision. Initially designed as a set theory, it was generalized to the set of ...
Marcos Cordeiro d'Ornellas, Rein van den Boomgaard
IOLTS
2005
IEEE
120views Hardware» more  IOLTS 2005»
14 years 2 months ago
Side-Channel Issues for Designing Secure Hardware Implementations
Selecting a strong cryptographic algorithm makes no sense if the information leaks out of the device through sidechannels. Sensitive information, such as secret keys, can be obtai...
Lejla Batina, Nele Mentens, Ingrid Verbauwhede
OTM
2005
Springer
14 years 2 months ago
An Integrated Alerting Service for Open Digital Libraries: Design and Implementation
Abstract. Alerting services can provide a valuable support for information seeking in Digital Libraries (DL). Several systems have been proposed. Most of them have serious drawback...
Annika Hinze, Andrea Schweer, George Buchanan
P2P
2003
IEEE
14 years 1 months ago
Secure and Resilient Peer-to-Peer E-Mail: Design and Implementation
E-mail is a mission-critical communication function for virtually all institutions. Modern e-mail employs a servercentric design, in which the user is critically dependent on her ...
Jussi Kangasharju, Keith W. Ross, David A. Turner