Sciweavers

123 search results - page 15 / 25
» Obfuscation for Cryptographic Purposes
Sort
View
NDSS
2009
IEEE
14 years 2 months ago
CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable
We describe CSAR, a novel technique for generating cryptographically strong, accountable randomness. Using CSAR, we can generate a pseudo-random sequence and a proof that the elem...
Michael Backes, Peter Druschel, Andreas Haeberlen,...
GLVLSI
2007
IEEE
162views VLSI» more  GLVLSI 2007»
14 years 1 months ago
Design of an UHF RFID transponder for secure authentication
RFID technology increases rapidly its applicability in new areas of interest without guaranteeing security and privacy issues. This paper presents a new architecture of an RFID tr...
Paolo Bernardi, Filippo Gandino, Bartolomeo Montru...
ICCCN
2007
IEEE
14 years 1 months ago
Safeguarding Mutable Fields in AODV Route Discovery Process
— Assuring cryptographic integrity of mutable fields in any on-demand ad hoc routing protocol is more challenging than that of non mutable fields. We propose an efficient auth...
Kulasekaran A. Sivakumar, Mahalingam Ramkumar
ACISP
2003
Springer
14 years 26 days ago
Robust Software Tokens - Yet Another Method for Securing User's Digital Identity
Abstract. This paper presents a robust software token that was developed to protect user’s digital identity by simple software-only techniques. This work is closely related to Ho...
Taekyoung Kwon
ACNS
2010
Springer
185views Cryptology» more  ACNS 2010»
14 years 13 days ago
Adaptive Chosen-Message Side-Channel Attacks
Most side-channel attacks that have been published in the open literature assume known- or chosen-message adversarial scenarios. In this paper, we analyze the increase of the attac...
Nicolas Veyrat-Charvillon, François-Xavier ...