Sciweavers

8499 search results - page 20 / 1700
» cans 2009
Sort
View
CANS
2009
Springer
109views Cryptology» more  CANS 2009»
14 years 4 months ago
Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves
This paper describes the design of a fast multi-core library for the cryptographic Tate pairing over supersingular elliptic curves. For the computation of the reduced modified Tat...
Jean-Luc Beuchat, Emmanuel López-Trejo, Lui...
IACR
2011
129views more  IACR 2011»
12 years 9 months ago
Improved Side Channel Cube Attacks on PRESENT
: The paper presents several improved side channel cube attacks on PRESENT based on single bit leakage model. Compared with the previous study of Yang et al in CANS 2009 [30], base...
Xin-jie Zhao, Tao Wang, Shi-ze Guo
PET
2009
Springer
14 years 4 months ago
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases
: © Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao HP Labor...
Brian Thompson, Stuart Haber, William G. Horne, To...
WINE
2009
Springer
123views Economy» more  WINE 2009»
14 years 4 months ago
Pseudonyms in Cost-Sharing Games
This work initiates the study of cost-sharing mechanisms that, in addition to the usual incentive compatibility conditions, make it disadvantageous for the users to employ pseudon...
Paolo Penna, Florian Schoppmann, Riccardo Silvestr...
ICUMT
2009
13 years 7 months ago
Adaptive resource control in 2-hop ad-hoc networks
This paper presents a simple resource control mechanism with traffic scheduling for 2-hop ad-hoc networks, in which the Request-To-Send (RTS) packet is utilized to deliver feedback...
Yimeng Yang, Geert J. Heijenk, Boudewijn R. Haverk...