Sciweavers

66 search results - page 9 / 14
» crypto 2009
Sort
View
ICISC
2009
108views Cryptology» more  ICISC 2009»
13 years 7 months ago
Lightweight Cryptography and RFID: Tackling the Hidden Overheads
Abstract. The field of lightweight cryptography has developed significantly over recent years and many impressive implementation results have been published. However these results ...
Axel Poschmann, Matthew J. B. Robshaw, Frank Vater...
SP
2009
IEEE
130views Security Privacy» more  SP 2009»
14 years 4 months ago
Wirelessly Pickpocketing a Mifare Classic Card
The Mifare Classic is the most widely used contactless smartcard on the market. The stream cipher CRYPTO1 used by the Classic has recently been reverse engineered and serious atta...
Flavio D. Garcia, Peter van Rossum, Roel Verdult, ...
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
14 years 4 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
ESSOS
2009
Springer
14 years 4 months ago
Report: Extensibility and Implementation Independence of the .NET Cryptographic API
Abstract. When a vulnerability is discovered in a cryptographic algorithm, or in a specific implementation of that algorithm, it is important that software using that algorithm or...
Pieter Philippaerts, Cédric Boon, Frank Pie...
CRYPTO
2010
Springer
145views Cryptology» more  CRYPTO 2010»
13 years 10 months ago
Protocols for Multiparty Coin Toss with Dishonest Majority
Coin-tossing protocols are protocols that generate a random bit with uniform distribution. These protocols are used as a building block in many cryptographic protocols. Cleve [STOC...
Amos Beimel, Eran Omri, Ilan Orlov