Sciweavers

66 search results - page 7 / 14
» crypto 2009
Sort
View
CRYPTO
2009
Springer
121views Cryptology» more  CRYPTO 2009»
14 years 4 months ago
Collusion-Free Multiparty Computation in the Mediated Model
Collusion-free protocols prevent subliminal communication (i.e., covert channels) between parties running the protocol. In the standard communication model, if one-way functions ex...
Joël Alwen, Jonathan Katz, Yehuda Lindell, Gi...
FSE
2009
Springer
152views Cryptology» more  FSE 2009»
14 years 10 months ago
Blockcipher-Based Hashing Revisited
We revisit the rate-1 blockcipher based hash functions as first studied by Preneel, Govaerts and Vandewalle (Crypto'93) and later extensively analysed by Black, Rogaway and Sh...
Martijn Stam
ACSAC
2009
IEEE
14 years 4 months ago
Java Security: A Ten Year Retrospective
— The first edition of Java (both the language and the platform) was released in 1995, which contained the all-ornothing security access model. A mid-1997 paper I published in IE...
Li Gong
ACSAC
2009
IEEE
14 years 4 months ago
Symmetric Cryptography in Javascript
—We take a systematic approach to developing a symmetric cryptography library in Javascript. We study various strategies for optimizing the code for the Javascript interpreter, a...
Emily Stark, Michael Hamburg, Dan Boneh
LATINCRYPT
2010
13 years 8 months ago
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves
Let E be a non-supersingular elliptic curve over a finite field Fq. At CRYPTO 2009, Icart introduced a deterministic function Fq → E(Fq) which can be computed efficiently, and ...
Pierre-Alain Fouque, Mehdi Tibouchi