Sciweavers

631 search results - page 8 / 127
» Intrusion-Resilient Secure Channels
Sort
View
133
Voted
IJNSEC
2010
128views more  IJNSEC 2010»
14 years 10 months ago
New Efficient Searchable Encryption Schemes from Bilinear Pairings
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...
Chunxiang Gu, Yuefei Zhu
106
Voted
SP
1991
IEEE
15 years 7 months ago
Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels
Phillip A. Porras, Richard A. Kemmerer
130
Voted
TIT
2010
88views Education» more  TIT 2010»
14 years 10 months ago
Multiple-Input Multiple-Output Gaussian Broadcast Channels With Common and Confidential Messages
This paper considers the problem of the multiple-input multiple-output (MIMO) Gaussian broadcast channel with two receivers (receivers 1 and 2) and two messages: a common message ...
Hung D. Ly, Tie Liu, Yingbin Liang
159
Voted
CHES
2011
Springer
254views Cryptology» more  CHES 2011»
14 years 3 months ago
Extractors against Side-Channel Attacks: Weak or Strong?
Randomness extractors are important tools in cryptography. Their goal is to compress a high-entropy source into a more uniform output. Beyond their theoretical interest, they have ...
Marcel Medwed, François-Xavier Standaert
145
Voted
BIRTHDAY
2012
Springer
13 years 11 months ago
Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders
We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the intersection between One-Time Programs and Boolean masking schemes. First, we show t...
François-Xavier Standaert, Christophe Petit...