Sciweavers

38 search results - page 6 / 8
» A Practical Key Recovery Attack on Basic TCHo
Sort
View
EUROCRYPT
2000
Springer
13 years 11 months ago
Using Hash Functions as a Hedge against Chosen Ciphertext Attack
The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem that is secure against adaptive chosen ciphertext attack provided the Decision...
Victor Shoup
CHES
2009
Springer
157views Cryptology» more  CHES 2009»
14 years 8 months ago
Differential Cluster Analysis
Abstract. We propose a new technique called Differential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions ...
Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Ru...
FC
2009
Springer
100views Cryptology» more  FC 2009»
14 years 2 months ago
Expecting the Unexpected: Towards Robust Credential Infrastructure
Cryptographic credential infrastructures, such as Public key infrastructure (PKI), allow the building of trust relationships in electronic society and electronic commerce. At the c...
Shouhuai Xu, Moti Yung
ICALP
2010
Springer
14 years 17 days ago
Concurrent Knowledge Extraction in the Public-Key Model
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal st...
Andrew C. Yao, Moti Yung, Yunlei Zhao
ICICS
2010
Springer
13 years 5 months ago
Compromise-Resilient Anti-jamming for Wireless Sensor Networks
Abstract. Jamming is a kind of Denial-of-Service (DoS) attack in which an adversary purposefully emits radio frequency signals to corrupt wireless transmissions. Thus, the communic...
Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao