Sciweavers

CTRSA
2007
Springer
161views Cryptology» more  CTRSA 2007»
14 years 5 months ago
Cache Based Remote Timing Attack on the AES
We introduce a new robust cache-based timing attack on AES. We present experiments and concrete evidence that our attack can be used to obtain secret keys of remote cryptosystems i...
Onur Aciiçmez, Werner Schindler, Çet...
CTRSA
2007
Springer
111views Cryptology» more  CTRSA 2007»
14 years 5 months ago
Predicting Secret Keys Via Branch Prediction
This paper announces a new software side-channel attack — enabled by the branch prediction capability common to all modern highperformance CPUs. The penalty paid (extra clock cyc...
Onur Aciiçmez, Çetin Kaya Koç...
CTRSA
2007
Springer
112views Cryptology» more  CTRSA 2007»
14 years 5 months ago
Directed Transitive Signature Scheme
In 2002, Micali and Rivest raised an open problem as to whether directed transitive signatures exist or not. In 2003, Hohenberger formalized the necessary mathematical criteria for...
Xun Yi
CISC
2007
Springer
133views Cryptology» more  CISC 2007»
14 years 5 months ago
Unlinkable Randomizable Signature and Its Application in Group Signature
We formalize a generic method of constructing efficient group signatures, specifically, we define new notions of unlinkable randomizable signature, indirectly signable signature ...
Sujing Zhou, Dongdai Lin
CISC
2007
Springer
98views Cryptology» more  CISC 2007»
14 years 5 months ago
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract. The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform ...
Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffr...
CISC
2007
Springer
156views Cryptology» more  CISC 2007»
14 years 5 months ago
Deniable Authentication on the Internet
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a third party the fact of communication. In this paper, w...
Shaoquan Jiang
CISC
2007
Springer
125views Cryptology» more  CISC 2007»
14 years 5 months ago
Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent
Abstract. This paper reports on the improved and multiple linear cryptanalysis of reduced round Serpent by mean of a branch-and-bound characteristic search within the algorithm. We...
Baudoin Collard, François-Xavier Standaert,...
CISC
2007
Springer
111views Cryptology» more  CISC 2007»
14 years 5 months ago
Multivariates Polynomials for Hashing
We propose the idea of building a secure hash using quadratic or higher degree multivariate polynomials over a finite field as the compression function. We analyze some security ...
Jintai Ding, Bo-Yin Yang
CISC
2007
Springer
120views Cryptology» more  CISC 2007»
14 years 5 months ago
Anonymity and k-Choice Identities
Jacek Cichon, Miroslaw Kutylowski
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
14 years 5 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai