Sciweavers

319 search results - page 5 / 64
» Controlled Secret Leakage
Sort
View
TCC
2009
Springer
114views Cryptology» more  TCC 2009»
14 years 8 months ago
Predicate Privacy in Encryption Systems
Predicate encryption is a new encryption paradigm which gives a master secret key owner fine-grained control over access to encrypted data. The master secret key owner can generat...
Emily Shen, Elaine Shi, Brent Waters
DATE
2004
IEEE
111views Hardware» more  DATE 2004»
13 years 11 months ago
State-Preserving vs. Non-State-Preserving Leakage Control in Caches
This paper compares the effectiveness of statepreserving and non-state-preserving techniques for leakage control in caches by comparing drowsy cache and gated-V
Yingmin Li, Dharmesh Parikh, Yan Zhang, Karthik Sa...
WISA
2009
Springer
14 years 2 months ago
A Comparative Study of Mutual Information Analysis under a Gaussian Assumption
In CHES 2008 a generic side-channel distinguisher, Mutual Information, has been introduced to be independent of the relation between measurements and leakages as well as between le...
Amir Moradi, Nima Mousavi, Christof Paar, Mahmoud ...
CHES
2008
Springer
260views Cryptology» more  CHES 2008»
13 years 10 months ago
Mutual Information Analysis
We propose a generic information-theoretic distinguisher for differential side-channel analysis. Our model of side-channel leakage is a refinement of the one given by Standaert et ...
Benedikt Gierlichs, Lejla Batina, Pim Tuyls, Bart ...
COMPSEC
2010
124views more  COMPSEC 2010»
13 years 6 months ago
A provably secure secret handshake with dynamic controlled matching
Abstract A Secret Handshake is a protocol that allows two users to mutually verify one another’s properties, and in case of simultaneous matching, to share a key used to secure s...
Alessandro Sorniotti, Refik Molva