A secure reliable multicast protocol enables a process to send a message to a group of recipients such that all correct destinations receive the same message, despite the maliciou...
Hardware implementations of cryptographic algorithms are still vulnerable to side-channel attacks. Side-channel attacks that are based on multiple measurements of the same operatio...
The Exponential Challenge Response (XRC) and Dual Exponential Challenge Response (DCR) signature schemes are the building blocks of the HMQV protocol. We propose a complementary an...
Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Cla...
This paper provides an overview of important software engineering research issues related to the development of applications that run on mobile devices. Among the topics are devel...
The security-mediated approach to PKI offers several advantages, such as instant revocation and compatibility with standard RSA tools. In this paper, we present a design and protot...