Sciweavers

100 search results - page 6 / 20
» Cryptographic measures in information hiding
Sort
View
JOT
2006
185views more  JOT 2006»
13 years 7 months ago
Empirical Study of Object-Oriented Metrics
The increasing importance of software measurement has led to development of new software measures. Many metrics have been proposed related to various constructs like class, coupli...
K. K. Aggarwal, Yogesh Singh, Arvinder Kaur, Ruchi...
USENIX
1994
13 years 8 months ago
SNP: An Interface for Secure Network Programming
SNP provides a high-level abstraction for secure end-toend network communications. It supports both stream and datagram semantics with security guarantees (e.g., data originauthen...
Thomas Y. C. Woo, Raghuram Bindignavle, Shaowen Su...
AINA
2006
IEEE
14 years 1 months ago
Dual RSA Accumulators and Its Application for Private Revocation Check
This paper points out the privacy issue in the OCSP (Online Certificate Status Protocol), namely, the OCSP responder learns confidential information – who sends a message to w...
Hiroaki Kikuchi
ICISC
2008
113views Cryptology» more  ICISC 2008»
13 years 8 months ago
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
Hardware implementations of cryptographic algorithms are still vulnerable to side-channel attacks. Side-channel attacks that are based on multiple measurements of the same operatio...
Svetla Nikova, Vincent Rijmen, Martin Schläff...
ESORICS
2008
Springer
13 years 9 months ago
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
Abstract. We propose a novel approach for quantifying a system's resistance to unknown-message side-channel attacks. The approach is based on a measure of the secret informati...
Michael Backes, Boris Köpf