Adversary model

Results: 85



#Item
41Secure multi-party computation / IP / Adversary model / Transmission Control Protocol / Cryptography / Mathematics / Computing / Cryptographic protocols / Applied mathematics / Analysis of algorithms

On Achieving the “Best of Both Worlds” in Secure Multiparty Computation∗ Jonathan Katz† Abstract Two settings are typically considered for secure multiparty computation, depending on

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-01-08 13:33:41
42RSA / Adversary / Cryptographic primitive / Cryptography / Public-key cryptography / Side channel attack

SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks1,2 Filipe Rosado da-Fonseca Lisbon, Portugal Email:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-23 06:54:05
43Trusted computing / Complexity classes / Formal verification / Trusted Execution Technology / Trusted Platform Module / Adversary model / Replay attack / Interrupt / IP / Theoretical computer science / Cryptography / Applied mathematics

Systematic Treatment of Remote Attestation Aurelien Francillon Networking and Security Group Eurecom Instutute

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-20 17:27:19
44Analysis of algorithms / Randomness / Advantage / Randomized algorithm / Adversary model / Pseudorandomness / Transmission Control Protocol / Randomness extractor / Random number generation / Cryptography / Theoretical computer science / Applied mathematics

Authenticated Key Exchange under Bad Randomness? Guomin Yang1 , Shanshan Duan2 , Duncan S. Wong3 , Chik How Tan1 , and Huaxiong Wang4 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-18 22:21:28
45Advantage / Adversary model / Diffie–Hellman problem / Random oracle / Cryptography / Cryptographic protocols / Cryptographic hash functions

Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem Hai Huang and Zhenfu Cao Department of Computer Science and Engineering, Shanghai Jiaotong University, 800 Dongchuan Road,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-27 03:18:55
46Commitment scheme / Proactive secret sharing / Ciphertext indistinguishability / Adversary model / Advantage / Cryptography / Cryptographic protocols / Secret sharing

The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-20 03:48:31
47Computational complexity theory / Coding theory / Randomness / Randomness extractor / Extractor / Advantage / Ciphertext indistinguishability / Leftover hash lemma / Adversary model / Cryptography / Theoretical computer science / Applied mathematics

An extended abstract of this paper appears in the proceedings of the 11th ACM Conference on Computer and Communications Security—CCS 2004, Washington, DC, OctoberThis expanded version is available from the IACR

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-15 15:22:16
48File sharing networks / LOCKSS / Opinion poll / Peer-to-peer / Consensus / Communications protocol / Adversary model / Statistics / Computing / Data

Preserving Peer Replicas By Rate-Limited Sampled Voting Petros Maniatis ∗

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2004-04-16 10:36:21
49Online algorithms / PUF / Advantage / Adversary model / Applied mathematics / Mathematics / Computer science / Physical Unclonable Function / Randomness / Analysis of algorithms

Foundations of Reconfigurable PUFs Jonas Schneider and Dominique Schr¨oder Saarland University Abstract. A Physically Unclonable Function (PUF) can be seen as a source of randomness that can be challenged with a stimulu

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-02 12:17:10
50Computing / System software / Degree of anonymity / Onion routing / Tor / Anonymity / Ciphertext indistinguishability / Adversary model / Internet privacy / Cryptographic software / Internet

(Nothing else) MATor(s): Monitoring the Anonymity of Tor’s Path Selection Michael Backes1,2 Aniket Kate1,3

Add to Reading List

Source URL: www.infsec.cs.uni-saarland.de

Language: English - Date: 2014-10-15 11:46:33
UPDATE