Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
This report details part of the results of five software audits that were done to evaluate various aspects of the quality in five very big software projects. One result of our work...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...