Sciweavers

555 search results - page 62 / 111
» From ABZ to Cryptography
Sort
View
CHES
2009
Springer
157views Cryptology» more  CHES 2009»
14 years 10 months ago
Differential Cluster Analysis
Abstract. We propose a new technique called Differential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions ...
Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Ru...
CHES
2009
Springer
141views Cryptology» more  CHES 2009»
14 years 10 months ago
Fault Attacks on RSA Signatures with Partially Unknown Messages
Fault attacks exploit hardware malfunctions to recover secrets from embedded electronic devices. In the late 90's, Boneh, DeMillo and Lipton [6] introduced fault-based attacks...
Jean-Sébastien Coron, Antoine Joux, Ilya Ki...
CHES
2009
Springer
248views Cryptology» more  CHES 2009»
14 years 10 months ago
The State-of-the-Art in IC Reverse Engineering
? This paper gives an overview of the place of reverse engineering (RE) in the semiconductor industry, and the techniques used to obtain information from semiconductor products. Th...
Randy Torrance, Dick James
PKC
2009
Springer
180views Cryptology» more  PKC 2009»
14 years 10 months ago
Security of Sanitizable Signatures Revisited
Sanitizable signature schemes, as defined by Ateniese et al. (ESORICS 2005), allow a signer to partly delegate signing rights to another party, called the sanitizer. That is, the s...
Anja Lehmann, Christina Brzuska, Dominique Schr&ou...
MOBIHOC
2007
ACM
14 years 9 months ago
Containing denial-of-service attacks in broadcast authentication in sensor networks
Broadcast authentication is an important application in sensor networks. Public Key Cryptography (PKC) is desirable for this application, but due to the resource constraints on se...
Ronghua Wang, Wenliang Du, Peng Ning