SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Smeets Ben) "

Sökning: WFRF:(Smeets Ben)

  • Resultat 1-10 av 55
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Arndt, D. S., et al. (författare)
  • STATE OF THE CLIMATE IN 2017
  • 2018
  • Ingår i: Bulletin of The American Meteorological Society - (BAMS). - : American Meteorological Society. - 0003-0007 .- 1520-0477. ; 99:8, s. S1-S310
  • Forskningsöversikt (refereegranskat)
  •  
2.
  • 2019
  • Tidskriftsartikel (refereegranskat)
  •  
3.
  • Afanassiev, Valentin, et al. (författare)
  • Fast authentication codes based on random polynomial residue classes
  • 1997
  • Ingår i: Proceedings 1997 IEEE International Symposium on Information Theory. - 2157-8095. - 0780339568 - 9780780339569 ; , s. 175-175
  • Konferensbidrag (refereegranskat)abstract
    • The verification of the authenticity of a text document or a datafile is one of the main applications of cryptographic techniques. A common used technique for this purpose is the application of a message authentication code (MAC). Usually the MAC computation has to be done in software. Based on the relationship between error-correcting codes and so-called families of almost universal hash functions, and the error-correcting codes using polynomial residue classes we describe an efficient procedure for a MAC computation which is much faster than the standard MAC constructions using MD5 or SHA and uses much less key bits than the fast MACs based on bucket hashing.
  •  
4.
  • Afanassiev, Valentine, et al. (författare)
  • Fast message authentication using efficient polynomial evaluation
  • 1997
  • Ingår i: Fast Software Encryption : 4th International Workshop, FSE 1997, Proceedings - 4th International Workshop, FSE 1997, Proceedings. - Berlin, Heidelberg : Springer Berlin Heidelberg. - 1611-3349 .- 0302-9743. - 3540632476 - 9783540632474 ; 1267, s. 190-204
  • Konferensbidrag (refereegranskat)abstract
    • Message authentication codes (MACs) using polynomial evaluation have the advantage of requiring a very short key even for very large messages. We describe a low complexity software polynomial evaluation procedure, that for large message sizes gives a MAC that has about the same low software complexity as for bucket hashing but requires only small keys and has better security characteristics.
  •  
5.
  • Alfredsson, Lars-Inge, 1964- (författare)
  • VLSI Architectures and Arithmetic Operations with Application to the Fermat Number Transform
  • 1996
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The properties of arithmetic operations in Fermat integer quotient rings 2m+1, where m = 2t, are investigated. The arithmetic operations considered are mainly those involved in the computation of the Fermat number transform. We consider some ways of representing the binary coded integers in such rings and investigate VLSI architectures for arithmetic operations, with respect to the different element representations. The VLSI architectures are mutually compared with respect to area (A) and time (T) complexity and area-time performance (AT2). The VLSI model chosen is a linears witch-level RC model.In the polar representation, the nonzero elements of a field are represented by the powers of a primitive element of the field. In the thesis we particularly investigate the properties of arithmetic operations and their corresponding VLSI architectureswith respect to the polar representation of the elements of Fermat prime fields. Somenew results regarding the applicability of the Fermat number transform when usingthe polar representation are also presented.
  •  
6.
  • Anderson, Kristin, 1977- (författare)
  • Tree Structures in Broadcast Encryption
  • 2005
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The need for broadcast encryption arises when a sender wishes to securely distribute messages to varying subsets of receivers, using a broadcast channel, for instance in a pay-TV scenario. This is done by selecting subsets of users and giving all users in the same subset a common decryption key. The subsets will in general be overlapping so that each user belongs to many subsets and has several different decryption keys. When the sender wants to send a message to some users, the message is encrypted using keys that those users have. In this thesis we describe some broadcast encryption schemes that have been proposed in the literature. We focus on stateless schemes which do not require receivers to update their decryption keys after the initial keys have been received; particularly we concentrate on the Subset Difference (SD) scheme.We consider the effects that the logical placement of the receivers in the tree structure used by the SD scheme has on the number of required transmissions for each message. Bounds for the number of required transmissions are derived based on the adjacency of receivers in the tree structure. The tree structure itself is also studied, also resulting in bounds on the number of required transmissions based on the placement of the users in the tree structure.By allowing a slight discrepancy between the set of receivers that the sender intends to send to and the set of receivers that actually can decrypt the message, we can reduce the cost in number of transmissions per message. We use the concept of distortion to quantify the discrepancy and develop three simple algorithms to illustrate how the cost and distortion are related.
  •  
7.
  • Aslam, Mudassar, 1979- (författare)
  • Secure Service Provisioning in a Public Cloud
  • 2012
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The evolution of cloud technologies which allows the provisioning of IT resources over the Internet promises many benefits for the individuals and enterprises alike. However, this new resource provisioning model comes with the security challenges which did not exist in the traditional resource procurement mechanisms. We focus on the possible security concerns of a cloud user (e.g. an organization, government department, etc.) to lease cloud services such as resources in the form of Virtual Machines (VM) from a public Infrastructure-as-a-Service (IaaS) provider. There are many security critical areas in the cloud systems, such as data confidentiality, resource integrity, service compliance, security audits etc. In this thesis, we focus on the security aspects which result in the trust deficit among the cloud stakeholders and hence hinder a security sensitive user to benefit from the opportunities offered by the cloud computing. Based upon our findings from the security requirements analysis,we propose solutions that enable user trust in the public IaaS clouds. Our solutions mainly deal with the secure life cycle management of the user VM which include mechanisms for VM launch and migration. The VM launch and migration solutions ensure that the user VM is always protected in the cloud by only allowing it to run on the user trusted platforms. This is done by using trusted computing techniques that allow the users to remotely attest and hence rate the cloud platforms trusted or untrusted. We also provide a prototype implementation to prove the implementation feasibility of the proposed trust enabling principles used in the VM launch and migration solutions.
  •  
8.
  • Bergström, Daniel, et al. (författare)
  • Facilitating online trust with Blockchains
  • 2019
  • Ingår i: Ericsson Review (English Edition). - 0014-0171. ; 100:2, s. 8-17
  • Tidskriftsartikel (övrigt vetenskapligt/konstnärligt)
  •  
9.
  • Bierbrauer, J., et al. (författare)
  • On the construction of universal families of hash functions via geometric codes and concatenation
  • 1993
  • Ingår i: Advances in Cryptology / Lecture Notes in Computer Science. - Berlin, Heidelberg : Springer Berlin Heidelberg. - 1611-3349 .- 0302-9743. - 9783540577669 ; 773, s. 331-342
  • Konferensbidrag (refereegranskat)abstract
    • In this paper we use coding theory to give simple explanations of some recent results on universal hashing. We first apply our approach to give a precise and elegant analysis of the Wegman-Carter construction for authentication codes. Using Reed-Solomon codes and the well known concept of concatenated codes we can then give some new constructions, which require much less key size than previously known constructions. The relation to coding theory allows the use of codes from algebraic curves for the construction of hash functions. Particularly, we show how codes derived from Artin-Schreier curves, Hermitian curves and Suzuki curves yield good classes of universal hash functions.
  •  
10.
  • Chepyshov, V., et al. (författare)
  • A simple algorithm for fast correlation attacks on stream ciphers
  • 2000
  • Ingår i: Fast Software Encryption / Lecture Notes in Computer Science. - Berlin, Heidelberg : Springer Berlin Heidelberg. - 1611-3349 .- 0302-9743. - 9783540417286 ; 1978, s. 181-195
  • Konferensbidrag (refereegranskat)abstract
    • A new simple algorithm for fast correlation attacks on stream ciphers is presented. The advantages of the new approach are at least two. Firstly, the new algorithm significantly reduces the memory requirements compared with some recent proposals [2],[3]. This allows more powerful attacks than previously. Secondly, the simplicity of the algorithm allows us to derive theoretical results. We determine the relation between the number of observed symbols, the correlation probability, and the allowed computational complexity, required for a successful attack. Hence, we can get theoretical estimates on the required computational complexity in cases when simulation is not possible.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 55
Typ av publikation
konferensbidrag (24)
tidskriftsartikel (14)
patent (6)
doktorsavhandling (4)
licentiatavhandling (4)
bokkapitel (2)
visa fler...
forskningsöversikt (1)
visa färre...
Typ av innehåll
refereegranskat (37)
övrigt vetenskapligt/konstnärligt (17)
populärvet., debatt m.m. (1)
Författare/redaktör
Olsson, Håkan (1)
Farrell, S. (1)
Scanlon, T. (1)
Ercole, A (1)
Martin, A. (1)
Williams, G. (1)
visa fler...
Wang, M. (1)
Kelly, Daniel (1)
Schmidt, S. (1)
Ackerman, Steven A. (1)
Allan, Rob (1)
Alves, Lincoln M. (1)
Amador, Jorge A. (1)
Andreassen, L. M. (1)
Arndt, Derek S. (1)
Azorin-Molina, César (1)
Bardin, M. U. (1)
Barichivich, Jonatha ... (1)
Baringer, Molly O. (1)
Barreira, Sandra (1)
Baxter, Stephen (1)
Becker, Andreas (1)
Bedka, Kristopher M. (1)
Bell, Gerald D. (1)
Belmont, M. (1)
Benedetti, Angela (1)
Berrisford, Paul (1)
Berry, David I. (1)
Bhatt, U. S. (1)
Bissolli, Peter (1)
Blake, Eric S. (1)
Bosilovich, Michael ... (1)
Boucher, Olivier (1)
Box, J. E. (1)
Boyer, Tim (1)
Braathen, Geir O. (1)
Bromwich, David H. (1)
Brown, R. (1)
Bulygina, Olga N. (1)
Burgess, D. (1)
Calderón, Blanca (1)
Camargo, Suzana J. (1)
Campbell, Jayaka D. (1)
Cappelen, J. (1)
Carter, Brendan R. (1)
Chambers, Don P. (1)
Christiansen, Hanne ... (1)
Christy, John R. (1)
Chung, E. S. (1)
Clem, Kyle R. (1)
visa färre...
Lärosäte
Lunds universitet (43)
Linköpings universitet (5)
Uppsala universitet (3)
Karolinska Institutet (3)
Kungliga Tekniska Högskolan (2)
Mälardalens universitet (2)
visa fler...
RISE (2)
Göteborgs universitet (1)
Umeå universitet (1)
Högskolan i Halmstad (1)
Stockholms universitet (1)
Chalmers tekniska högskola (1)
Karlstads universitet (1)
visa färre...
Språk
Engelska (54)
Svenska (1)
Forskningsämne (UKÄ/SCB)
Teknik (33)
Naturvetenskap (26)
Medicin och hälsovetenskap (2)
Samhällsvetenskap (2)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy