Sciweavers

97 search results - page 4 / 20
» Analysis of the E0 Encryption System
Sort
View
CAU
2004
192views Cryptology» more  CAU 2004»
14 years 8 days ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow
TR
2011
172views more  TR 2011»
13 years 5 months ago
Multi-State Reliability Systems Under Discrete Time Semi-Markovian Hypothesis
We consider repairable reliability systems with m components, the lifetimes and repair times of which are independent. The l-th component can be either in the failure state 0 or i...
Ourania Chryssaphinou, Nikolaos Limnios, Sonia Mal...
FOSSACS
2004
Springer
14 years 4 months ago
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols
Abstract. Using a probabilistic polynomial-time process calculus designed for specifying security properties as observational equivalences, we develop a form of bisimulation that j...
Ajith Ramanathan, John C. Mitchell, Andre Scedrov,...
CCS
2010
ACM
13 years 11 months ago
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where...
Ueli Maurer, Björn Tackmann
HICSS
2006
IEEE
131views Biometrics» more  HICSS 2006»
14 years 5 months ago
Design and Characterization of a Hardware Encryption Management Unit for Secure Computing Platforms
— Software protection is increasingly necessary for uses in commercial systems, digital content distributors, and military systems. The Secure Software (SecSoft) architecture is ...
Anthony J. Mahar, Peter M. Athanas, Stephen D. Cra...