190
click to vote
CTRSA
9 years 10 months ago
2016 Springer
With the growing popularity of remote storage, the ability to outsource a large private database yet be able to search on this encrypted data is critical. Searchable symmetric encr...
110
Voted
CTRSA
9 years 10 months ago
2016 Springer 112
click to vote
CTRSA
9 years 10 months ago
2016 Springer
Authentication and authenticated encryption with associated data (AEAD) are applied in cryptographic protocols to provide message integrity. The definitions in the literature and...
116
click to vote
CTRSA
9 years 10 months ago
2016 Springer
Abstract. Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications for securing communication channels. In this paper, we make the follo...
121
click to vote
CTRSA
9 years 10 months ago
2016 Springer
We present the first physical side-channel attack on elliptic curve cryptography running on a PC. The attack targets the ECDH public-key encryption algorithm, as implemented in t...
|