CTRSA
8 years 6 months ago
2016 Springer
With the growing popularity of remote storage, the ability to outsource a large private database yet be able to search on this encrypted data is critical. Searchable symmetric encr...
CTRSA
8 years 6 months ago
2016 Springer CTRSA
8 years 5 months ago
2016 Springer
Authentication and authenticated encryption with associated data (AEAD) are applied in cryptographic protocols to provide message integrity. The definitions in the literature and...
CTRSA
8 years 6 months ago
2016 Springer
Abstract. Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications for securing communication channels. In this paper, we make the follo...
CTRSA
8 years 5 months ago
2016 Springer
We present the first physical side-channel attack on elliptic curve cryptography running on a PC. The attack targets the ECDH public-key encryption algorithm, as implemented in t...
|