Sciweavers

CHES
2004
Springer
216views Cryptology» more  CHES 2004»
14 years 10 days ago
Efficient Countermeasures against RPA, DPA, and SPA
In the execution on a smart card, side channel attacks such as simple power analysis (SPA) and the differential power analysis (DPA) have become serious threat [15]. Side channel a...
Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto
ASIACRYPT
2004
Springer
14 years 10 days ago
Time-Memory Trade-Off Attacks on Multiplications and T-Functions
T
Joydip Mitra, Palash Sarkar
ASIACRYPT
2004
Springer
14 years 10 days ago
Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings
Group signature schemes are cryptographic systems that provide revocable anonymity for signers. We propose a group signature scheme with constant-size public key and signature leng...
Lan Nguyen, Reihaneh Safavi-Naini
AES
2004
Springer
80views Cryptology» more  AES 2004»
14 years 10 days ago
Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES
The best upper bounds on the maximum expected linear probability (MELP) and the maximum expected differential probability
Liam Keliher
ACNS
2006
Springer
148views Cryptology» more  ACNS 2006»
14 years 10 days ago
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families
A cover-free family is a well-studied combinatorial structure that has many applications in computer science and cryptography. In this paper, we propose a new public key traitor t...
Dongvu Tonien, Reihaneh Safavi-Naini
ACNS
2006
Springer
86views Cryptology» more  ACNS 2006»
14 years 10 days ago
Efficient Memory Bound Puzzles Using Pattern Databases
CPU bound client puzzles have been suggested as a defense mechanism against connection depletion attacks. However, the wide disparity in CPU speeds prevents such puzzles from being...
Sujata Doshi, Fabian Monrose, Aviel D. Rubin
ACNS
2006
Springer
138views Cryptology» more  ACNS 2006»
14 years 10 days ago
Syntax-Driven Private Evaluation of Quantified Membership Queries
Abstract. Membership queries are basic predicate operations that apply to datasets. Quantifications of such queries express global properties between datasets, including subset inc...
Aggelos Kiayias, Antonina Mitrofanova
ACNS
2006
Springer
241views Cryptology» more  ACNS 2006»
14 years 10 days ago
High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive
In this paper we combine the error correction and encryption functionality into one block cipher, which we call High Diffusion (HD) cipher. The error correcting property of this ci...
Chetan Nanjunda Mathur, Karthik Narayan, K. P. Sub...
ACNS
2004
Springer
131views Cryptology» more  ACNS 2004»
14 years 10 days ago
Evaluating Security of Voting Schemes in the Universal Composability Framework
In the literature, voting protocols are considered secure if they satisfy requirements such as privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting pr...
Jens Groth