Sciweavers

362 search results - page 29 / 73
» Abstraction in Cryptography
Sort
View
ACNS
2008
Springer
172views Cryptology» more  ACNS 2008»
14 years 3 months ago
Traceable Privacy of Recent Provably-Secure RFID Protocols
Abstract. One of the main challenges in RFIDs is the design of privacypreserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authen...
Khaled Ouafi, Raphael C.-W. Phan
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
14 years 3 months ago
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks
Abstract. What are the real security issues for a wireless sensor network (WSN) intended to monitor the structural health of a suspension bridge, a subway tunnel or a water distrib...
Frank Stajano, Daniel Cvrcek, Matt Lewis
CHES
2007
Springer
95views Cryptology» more  CHES 2007»
14 years 2 months ago
Side Channel Cryptanalysis of a Higher Order Masking Scheme
Abstract. In the recent years, DPA attacks have been widely investigated. In particular, 2-nd order DPA have been improved and successfully applied to break many masked implementat...
Jean-Sébastien Coron, Emmanuel Prouff, Matt...
CHES
2007
Springer
105views Cryptology» more  CHES 2007»
14 years 2 months ago
On the Implementation of a Fast Prime Generation Algorithm
Abstract. A side-channel analysis of a cryptographic algorithm generally concentrates on the encryption or decryption phases, rarely on the key generation phase. In this paper, we ...
Christophe Clavier, Jean-Sébastien Coron
CHES
2007
Springer
122views Cryptology» more  CHES 2007»
14 years 2 months ago
Two New Techniques of Side-Channel Cryptanalysis
Abstract. We describe two new techniques of side-channel cryptanalysis which we call the impossible collision attack and the multiset collision attack. These are inspired by the st...
Alex Biryukov, Dmitry Khovratovich