Sciweavers

FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
14 years 7 days ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
14 years 7 days ago
Non-linear Residue Codes for Robust Public-Key Arithmetic
We present a scheme for robust multi-precision arithmetic over the positive integers, protected by a novel family of non-linear arithmetic residue codes. These codes have a very hi...
Gunnar Gaubatz, Berk Sunar, Mark G. Karpovsky
FDTC
2006
Springer
80views Cryptology» more  FDTC 2006»
14 years 7 days ago
Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography
We present a new approach to fault tolerant public key cryptography based on redundant arithmetic in finite rings. Redundancy is achieved by embedding non-redundant field or ring ...
Gunnar Gaubatz, Berk Sunar
FDTC
2006
Springer
120views Cryptology» more  FDTC 2006»
14 years 7 days ago
Blinded Fault Resistant Exponentiation
As the core operation of many public key cryptosystems, group exponentiation is central to cryptography. Attacks on its implementation in embedded device setting is hence of great ...
Guillaume Fumaroli, David Vigilant
FDTC
2006
Springer
93views Cryptology» more  FDTC 2006»
14 years 7 days ago
Fault Based Collision Attacks on AES
Johannes Blömer, Volker Krummel
FDTC
2006
Springer
91views Cryptology» more  FDTC 2006»
14 years 7 days ago
Fault Analysis of DPA-Resistant Algorithms
Frederic Amiel, Christophe Clavier, Michael Tunsta...
FC
2006
Springer
99views Cryptology» more  FC 2006»
14 years 7 days ago
A Protocol for Secure Public Instant Messaging
Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention...
Mohammad Mannan, Paul C. van Oorschot
FC
2006
Springer
145views Cryptology» more  FC 2006»
14 years 7 days ago
Efficient Correlated Action Selection
Abstract. Participants in e-commerce and other forms of online collaborations tend to be selfish and rational, and therefore game theory has been recognized as particularly relevan...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
FC
2006
Springer
109views Cryptology» more  FC 2006»
14 years 7 days ago
A Private Stable Matching Algorithm
Existing stable matching algorithms reveal the preferences of all participants, as well as the history of matches made and broken in the course of computing a stable match. This in...
Philippe Golle