Sciweavers

262 search results - page 37 / 53
» MONA Implementation Secrets
Sort
View
IWDW
2005
Springer
14 years 2 months ago
ViWiD : Visible Watermarking Based Defense Against Phishing
In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks - a form of web based identity theft. ViWiD is an integrity check m...
Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, ...
TRUSTBUS
2005
Springer
14 years 2 months ago
Securing Operating System Services Based on Smart Cards
The executions of operating system services based on smart cards allow one to personalize some functionalities of the operating system by using the secret information stored in a s...
Luigi Catuogno, Roberto Gassirà, Michele Ma...
CHES
2004
Springer
99views Cryptology» more  CHES 2004»
14 years 2 months ago
Defeating Countermeasures Based on Randomized BSD Representations
Abstract. The recent development of side channel attacks has lead implementers to use increasingly sophisticated countermeasures in critical operations such as modular exponentiati...
Pierre-Alain Fouque, Frédéric Muller...
EUROCRYPT
2004
Springer
14 years 2 months ago
Projective Coordinates Leak
Denoting by P = [k]G the elliptic-curve double-and-add multiplication of a public base point G by a secret k, we show that allowing an adversary access to the projective representa...
David Naccache, Nigel P. Smart, Jacques Stern
FSE
2004
Springer
90views Cryptology» more  FSE 2004»
14 years 2 months ago
Fast Software-Based Attacks on SecurID
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurI...
Scott Contini, Yiqun Lisa Yin