Sciweavers

239 search results - page 14 / 48
» Proof Techniques for Cryptographic Processes
Sort
View
HOST
2009
IEEE
14 years 3 months ago
Secure IP-Block Distribution for Hardware Devices
—EDA vendors have proposed a standard for the sharing of IP among vendors to be used in the design and development of IP for FPGAs. Although, we do not propose any attacks, we sh...
Jorge Guajardo, Tim Güneysu, Sandeep S. Kumar...
CARDIS
1998
Springer
89views Hardware» more  CARDIS 1998»
14 years 25 days ago
Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol
We describe the implementation of the Shoup-Rubin key distribution protocol. This protocol stores long-term keys on a smartcard and uses the cryptographic capability of the card t...
Rob Jerdonek, Peter Honeyman, Kevin Coffman, Jim R...
ISCI
2008
160views more  ISCI 2008»
13 years 8 months ago
Certificateless undeniable signature scheme
In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent in identity based crypto...
Shanshan Duan
EURODAC
1994
IEEE
113views VHDL» more  EURODAC 1994»
14 years 21 days ago
Formal verification of pipeline conflicts in RISC processors
We outline a general methodology for the formal verification of pipeline conflicts in RISC cores. The different kinds of conflicts that can occur due to the simultaneous execution...
Ramayya Kumar, Sofiène Tahar
HIP
2005
Springer
172views Cryptology» more  HIP 2005»
14 years 2 months ago
Building Segmentation Based Human-Friendly Human Interaction Proofs (HIPs)
Human interaction proofs (HIPs) have become common place on the internet due to their effectiveness in deterring automated abuse of online services intended for humans. However, th...
Kumar Chellapilla, Kevin Larson, Patrice Y. Simard...