Sciweavers

5488 search results - page 155 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
121
Voted
CSREASAM
2006
15 years 6 months ago
Security Analysis of the Digital Transmission Copy Protection Specification
- This paper analyzes the secure protocols in the digital transmission copy protection (DTCP) specification. The full authentication protocol in the specification is a combination ...
Haibo Tian, Yumin Wang
ICISC
2008
113views Cryptology» more  ICISC 2008»
15 years 6 months ago
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
Hardware implementations of cryptographic algorithms are still vulnerable to side-channel attacks. Side-channel attacks that are based on multiple measurements of the same operatio...
Svetla Nikova, Vincent Rijmen, Martin Schläff...
130
Voted
ESORICS
2007
Springer
15 years 10 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...
STOC
2005
ACM
132views Algorithms» more  STOC 2005»
16 years 4 months ago
Concurrent general composition of secure protocols in the timing model
In the setting of secure multiparty computation, a set of parties wish to to jointly compute some function of their input (i.e., they wish to securely carry out some distributed t...
Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakar...
HICSS
2007
IEEE
97views Biometrics» more  HICSS 2007»
15 years 11 months ago
Implementation-Oriented Secure Architectures
We propose a framework for constructing secure systems at the architectural level. This framework is composed of an implementation-oriented formalization of a system’s architect...
Daniel Conte de Leon, Jim Alves-Foss, Paul W. Oman