Sciweavers

555 search results - page 56 / 111
» From ABZ to Cryptography
Sort
View
AAECC
2005
Springer
104views Algorithms» more  AAECC 2005»
13 years 9 months ago
Isomorphism Classes of Picard Curves over Finite Fields
In this paper we determine the number of isomorphism classes of Picard curves, i.e., superelliptic curves y3 = f(x) of genus three, over finite fields of characteristic different f...
Jong Won Lee
EUROCRYPT
2009
Springer
14 years 10 months ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...
CHES
2009
Springer
192views Cryptology» more  CHES 2009»
14 years 10 months ago
CDs Have Fingerprints Too
Abstract. We introduce a new technique for extracting unique fingerprints from identical CDs. The proposed technique takes advantage of manufacturing variability found in the lengt...
Ghaith Hammouri, Aykutlu Dana, Berk Sunar
CHES
2009
Springer
171views Cryptology» more  CHES 2009»
14 years 10 months ago
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering
Abstract. The general trend in semiconductor industry to separate design from fabrication leads to potential threats from untrusted integrated circuit foundries. In particular, mal...
Christof Paar, Lang Lin, Markus Kasper, Tim Gü...
TCC
2010
Springer
179views Cryptology» more  TCC 2010»
14 years 6 months ago
Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs
A family of trapdoor functions is one-way under correlated inputs if no efficient adversary can invert it even when given the value of the function on multiple correlated inputs. T...
Yevgeniy Vahlis