Sciweavers

385 search results - page 56 / 77
» Advances in smart cards
Sort
View
MMMACNS
2005
Springer
14 years 1 months ago
Unique User-Generated Digital Pseudonyms
Abstract. This paper presents a method to generate unique and nevertheless highly random pseudonyms in a distributed environment. More precisely, each user can now generate his pse...
Peter Schartner, Martin Schaffer
CARDIS
2004
Springer
97views Hardware» more  CARDIS 2004»
14 years 1 months ago
On the Security of the DeKaRT Primitive
DeKaRT primitives are key-dependent reversible circuits presented at CHES 2003. According to the author, the circuits described are suitable for data scrambling but also as buildin...
Gilles Piret, François-Xavier Standaert, Ga...
CHES
2004
Springer
121views Cryptology» more  CHES 2004»
14 years 1 months ago
Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?
Since their publication in 1998, power analysis attacks have attracted signiļ¬cant attention within the cryptographic community. So far, they have been successfully applied to diļ...
François-Xavier Standaert, Siddika Berna &O...
EUROPKI
2004
Springer
14 years 1 months ago
On the Use of Weber Polynomials in Elliptic Curve Cryptography
Abstract. In many cryptographic applications it is necessary to generate elliptic curves (ECs) with certain security properties. These curves are commonly constructed using the Com...
Elisavet Konstantinou, Yannis C. Stamatiou, Christ...
EUROPKI
2004
Springer
14 years 1 months ago
Threshold Password-Based Authentication Using Bilinear Pairings
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from diļ¬€erent client terminals) to download a private k...
Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Ki...