Eprint

Results: 2085



#Item
751Ubiquitous computing / Wireless / Authentication protocol / Technology / Computing / Information / Automatic identification and data capture / Privacy / Radio-frequency identification

On the (im)possibility of receiving security beyond 2l using an l-bit PRNG: the case of Wang et. al. protocol Masoumeh Safkhani1 , Nasour Bagheri1 , Mehdi Hosseinzadeh2 , Mojtaba Eslamnezhad Namin2 , Samad Rostampour2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 04:32:06
752Abstract algebra / Linear algebra / Cryptography / Theoretical computer science / Vector space / Vehicle Identification Number / Matrix / Ciphertext indistinguishability / Algorithm / Algebra / Mathematics / Vectors

Nearly Optimal Verifiable Data Streaming Johannes Krupp1 , Dominique Schr¨ oder1 , Mark Simkin1 , Dario Fiore2 , Giuseppe Ateniese3,4 , and Stefan Nuernberger1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 09:30:26
753MICKEY / Keystream / Linear feedback shift register / E0 / Crypt / Stream ciphers / Cryptography / Grain

Some results on Sprout Subhadeep Banik DTU Compute, Technical University of Denmark, Lyngby. Email: Abstract. Sprout is a lightweight stream cipher proposed by Armknecht and Mikhalev at FSEIt

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-11 19:35:56
754Human behavior / Computing / Recommender system / Eval / Cold start / Collaborative filtering / Slope One / Collective intelligence / Collaboration / Information science

Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions Qiang Tang and Jun Wang APSIA group, SnT, University of Luxembourg 6, rue Richard Coudenhove-Kalergi, L-1359 Luxembourg {qiang.tang, jun.wa

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 03:51:15
755Computing / Central processing unit / Cache / CPU cache / Translation lookaside buffer / Memory management unit / Page table / Advanced Encryption Standard / Page cache / Computer hardware / Computer memory / Virtual memory

Jackpot Stealing Information From Large Caches via Huge Pages Gorka Irazoqui, Thomas Eisenbarth, and Berk Sunar Worcester Polytechnic Institute, Worcester, MA, USA {girazoki,teisenbarth,sunar}@wpi.edu

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-16 14:39:32
756Randomness extractor / Applied mathematics / Mathematics / Calculus / Continuous function

Achieving Differential Privacy with Bias-Control Limited Source Yanqing Yaoa,b , Zhoujun Lia,c a State Key Laboratory of Software Development Environment, Beihang University,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-30 23:01:04
757Instruction set architectures / Central processing unit / Microcontrollers / Multiplication / Binary arithmetic / Z1 / Instruction set / ARM architecture / Atmel AVR / Computer architecture / Computer engineering / Computer hardware

High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers Michael Düll ·

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-17 14:57:38
758Daminozide / Elliptic curve cryptography / Key size / Computing / Telecommunications engineering / Technology / Sensors / Wireless sensor network

SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node 1 1 1,2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 09:02:17
759Integrated circuits / Digital electronics / Electronic design / Logic families / Decoupling capacitor / Capacitor / Decoupling / CMOS / IC power supply pin / Electronic engineering / Electronics / Electromagnetism

1 A Hardware-based Countermeasure to Reduce Side-Channel Leakage – Design, Implementation, and Evaluation – Andreas Gornik∗ , Amir Moradi† , Jürgen Oehm∗ , Christof Paar† , Fellow, IEEE

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-19 08:52:52
760Boomerang attack / Advantage / Ciphertext / Meet-in-the-middle attack / Stream cipher / Chosen-plaintext attack / Advanced Encryption Standard / Cryptanalysis / Block cipher / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

Security Analysis of PRINCE J´er´emy Jean1? , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2 and Shuang Wu2 ´ Ecole Normale Sup´erieure, France Division of Mathematical Sciences, School of Physical and Mathematical Sc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 23:59:39
UPDATE