Sciweavers

168 search results - page 19 / 34
» Statistics and Secret Leakage
Sort
View
HOST
2009
IEEE
14 years 2 months ago
Secure IP-Block Distribution for Hardware Devices
—EDA vendors have proposed a standard for the sharing of IP among vendors to be used in the design and development of IP for FPGAs. Although, we do not propose any attacks, we sh...
Jorge Guajardo, Tim Güneysu, Sandeep S. Kumar...
CONCUR
2000
Springer
13 years 12 months ago
Secrecy and Group Creation
We add an operation of group creation to the typed π-calculus, where a group is a type for channels. Creation of fresh groups has the effect of statically preventing certain com...
Luca Cardelli, Giorgio Ghelli, Andrew D. Gordon
CONCUR
2010
Springer
13 years 8 months ago
Information Flow in Interactive Systems
Abstract. We consider the problem of defining the information leakage in interactive systems where secrets and observables can alternate during the computation. We show that the in...
Mário S. Alvim, Miguel E. Andrés, Ca...
CNSM
2010
13 years 5 months ago
CRAC: Confidentiality risk assessment and IT-infrastructure comparison
Confidentiality is a critical aspect in todays Risk Assessment (RA) practices for many industrial organizations. Assessing confidentiality risks is challenging and the result of a ...
Ayse Morali, Emmanuele Zambon, Sandro Etalle, Roel...
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
13 years 11 months ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine