Sciweavers

783 search results - page 6 / 157
» On security proof of McCullagh
Sort
View
CRITIS
2008
13 years 11 months ago
Scada Malware, a Proof of Concept
Andrea Carcano, Igor Nai Fovino, Marcelo Masera, A...
STOC
2002
ACM
97views Algorithms» more  STOC 2002»
14 years 10 months ago
Tight security proofs for the bounded-storage model
Stefan Dziembowski, Ueli M. Maurer
IACR
2011
132views more  IACR 2011»
12 years 9 months ago
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Abstract. Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that...
Sebastian Faust, Krzysztof Pietrzak, Daniele Ventu...
ESORICS
2010
Springer
13 years 11 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
SP
2009
IEEE
114views Security Privacy» more  SP 2009»
14 years 4 months ago
Formally Certifying the Security of Digital Signature Schemes
We present two machine-checked proofs of the existential unforgeability under adaptive chosen-message attacks of the Full Domain Hash signature scheme. These proofs formalize the ...
Santiago Zanella Béguelin, Gilles Barthe, B...