Sciweavers

ICISC
2009
184views Cryptology» more  ICISC 2009»
13 years 10 months ago
Efficient Privacy-Preserving Face Recognition
Abstract. Automatic recognition of human faces is becoming increasingly popular in civilian and law enforcement applications that require reliable recognition of humans. However, t...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Immo We...
ICISC
2009
138views Cryptology» more  ICISC 2009»
13 years 10 months ago
Efficient Certificateless KEM in the Standard Model
Abstract. We give a direct construction of a certificateless key encapsulation mechanism (KEM) in the standard model that is more efficient than the generic constructions proposed ...
Georg Lippold, Colin Boyd, Juan Manuel Gonzá...
ICISC
2009
163views Cryptology» more  ICISC 2009»
13 years 10 months ago
Improved Linear Cryptanalysis of SOSEMANUK
The SOSEMANUK stream cipher is one of the finalists of the eSTREAM project. In this paper, we improve the linear cryptanalysis of SOSEMANUK presented in Asiacrypt 2008. We apply th...
Joo Yeon Cho, Miia Hermelin
ICISC
2009
120views Cryptology» more  ICISC 2009»
13 years 10 months ago
Factoring Unbalanced Moduli with Known Bits
Eric Brier, David Naccache, Mehdi Tibouchi
ICISC
2009
132views Cryptology» more  ICISC 2009»
13 years 10 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...
ICISC
2009
138views Cryptology» more  ICISC 2009»
13 years 10 months ago
Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
At CANS 2008, Mashatan and Stinson suggested a message recognition protocol for ad hoc pervasive networks. The protocol provides a procedure to resynchronize in case of a (possibly...
Madeline González Muñiz, Rainer Stei...
ICISC
2009
146views Cryptology» more  ICISC 2009»
13 years 10 months ago
First CPIR Protocol with Data-Dependent Computation
We design a new (n, 1)-CPIR protocol BddCpir for -bit strings as a combination of a noncryptographic (BDD-based) data structure and a more basic cryptographic primitive (communicat...
Helger Lipmaa
ICISC
2009
120views Cryptology» more  ICISC 2009»
13 years 10 months ago
Secret Handshakes with Revocation Support
Alessandro Sorniotti, Refik Molva
ICISC
2009
125views Cryptology» more  ICISC 2009»
13 years 10 months ago
Power Analysis of Single-Rail Storage Elements as Used in MDPL
Several dual-rail logic styles make use of single-rail flip-flops for storing intermediate states. We show that single mask bits, as applied by various side-channel resistant logic...
Amir Moradi, Thomas Eisenbarth, Axel Poschmann, Ch...
ICISC
2009
140views Cryptology» more  ICISC 2009»
13 years 10 months ago
Serial Model for Attack Tree Computations
Aivo Jürgenson, Jan Willemson