Sciweavers

16 search results - page 1 / 4
» ctrsa 2010
Sort
View
CTRSA
2010
Springer
135views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks
Shivam Bhasin, Sylvain Guilley, Laurent Sauvage, J...
CTRSA
2010
Springer
211views Cryptology» more  CTRSA 2010»
14 years 3 months ago
Anonymity from Asymmetry: New Constructions for Anonymous HIBE
A Hierarchical Identity Based Encryption (HIBE) system is anonymous if the ciphertext reveals no information about the recipient’s identity. create it. While there are multiple c...
Léo Ducas
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
14 years 5 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
14 years 5 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
CTRSA
2010
Springer
212views Cryptology» more  CTRSA 2010»
14 years 5 months ago
Fault Attacks Against emv Signatures
At ches 2009, Coron, Joux, Kizhvatov, Naccache and Paillier (cjknp) exhibited a fault attack against rsa signatures with partially known messages. This attack allows factoring the ...
Jean-Sébastien Coron, David Naccache, Mehdi...