Sciweavers

CHES
2006
Springer
134views Cryptology» more  CHES 2006»
14 years 10 days ago
Read-Proof Hardware from Protective Coatings
In cryptography it is assumed that adversaries only have black box access to the secret keys of honest parties. In real life, however, the black box approach is not sufficient beca...
Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan v...
CHES
2006
Springer
74views Cryptology» more  CHES 2006»
14 years 10 days ago
Optically Enhanced Position-Locked Power Analysis
Abstract. This paper introduces a refinement of the power-analysis attack on integrated circuits. By using a laser to illuminate a specific area on the chip surface, the current th...
Sergei P. Skorobogatov
CHES
2006
Springer
246views Cryptology» more  CHES 2006»
14 years 10 days ago
Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations
This article starts with a discussion of three different attacks on masked AES hardware implementations. This discussion leads to the conclusion that glitches in masked circuits po...
Stefan Mangard, Kai Schramm
CANS
2006
Springer
106views Cryptology» more  CANS 2006»
14 years 10 days ago
Efficient Identity-Based Encryption with Tight Security Reduction
Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi,...
CANS
2006
Springer
90views Cryptology» more  CANS 2006»
14 years 10 days ago
Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps
We propose a new computational complexity assumption from bilinear map, based on which we construct Verifier-Local Revocation group signatures with shorter lengths than previous on...
Sujing Zhou, Dongdai Lin
CANS
2006
Springer
114views Cryptology» more  CANS 2006»
14 years 10 days ago
Achieving Multicast Stream Authentication Using MDS Codes
We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network m...
Christophe Tartary, Huaxiong Wang
CANS
2006
Springer
83views Cryptology» more  CANS 2006»
14 years 10 days ago
Efficient Mutual Data Authentication Using Manually Authenticated Strings
Abstract. Solutions for an easy and secure setup of a wireless connection between two devices are urgently needed for WLAN, Wireless USB, Bluetooth and similar standards for short ...
Sven Laur, Kaisa Nyberg
CANS
2006
Springer
129views Cryptology» more  CANS 2006»
14 years 10 days ago
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Pairings on elliptic curves have been used as cryptographic primitives for the development of new applications such as identity based schemes. For the practical applications, it is...
Tae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Wo...
CANS
2006
Springer
136views Cryptology» more  CANS 2006»
14 years 10 days ago
Watermarking Essential Data Structures for Copyright Protection
Software watermarking is a new research area that aims at providing copyright protection for commercial software. It minimizes software piracy by hiding copyright signatures inside...
Qutaiba Albluwi, Ibrahim Kamel