Sciweavers

894 search results - page 35 / 179
» Secure Implementation of Channel Abstractions
Sort
View
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
13 years 8 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
EUROCRYPT
2000
Springer
13 years 11 months ago
Security Aspects of Practical Quantum Cryptography
The use of quantum bits (qubits) in cryptography holds the promise of secure cryptographic quantum key distribution schemes. Unfortunately, the implemented schemes are often operat...
Gilles Brassard, Norbert Lütkenhaus, Tal Mor,...
CCS
2000
ACM
14 years 2 days ago
Composition and integrity preservation of secure reactive systems
We consider compositional properties of reactive systems that are secure in a cryptographic sense. We follow the wellknown simulatability approach, i.e., the specification is an ...
Birgit Pfitzmann, Michael Waidner
VLSISP
2002
93views more  VLSISP 2002»
13 years 7 months ago
Efficient VLSI Architectures for Multiuser Channel Estimation in Wireless Base-Station Receivers
Abstract. This paper presents a reduced-complexity, fixed-point algorithm and efficient real-time VLSI architectures for multiuser channel estimation, one of the core baseband proc...
Sridhar Rajagopal, Srikrishna Bhashyam, Joseph R. ...
CCS
2005
ACM
14 years 1 months ago
Formal security analysis of basic network-attached storage
We study formal security properties of network-attached storage (NAS) in an applied pi calculus. We model NAS as an implementation of a specification based on traditional central...
Avik Chaudhuri, Martín Abadi