Sciweavers

CHES
2010
Springer
182views Cryptology» more  CHES 2010»
13 years 8 months ago
Developing a Hardware Evaluation Method for SHA-3 Candidates
Luca Henzen, Pietro Gendotti, Patrice Guillet, Enr...
CHES
2010
Springer
142views Cryptology» more  CHES 2010»
13 years 8 months ago
New Results on Instruction Cache Attacks
Onur Aciiçmez, Billy Bob Brumley, Philipp G...
CHES
2010
Springer
183views Cryptology» more  CHES 2010»
13 years 8 months ago
Coordinate Blinding over Large Prime Fields
In this paper we propose a multiplicative blinding scheme for protecting implementations of a scalar multiplication over elliptic curves. Specifically, this blinding method applies...
Michael Tunstall, Marc Joye
FC
2008
Springer
96views Cryptology» more  FC 2008»
13 years 9 months ago
An Efficient Anonymous Credential System
Norio Akagi, Yoshifumi Manabe, Tatsuaki Okamoto
CTRSA
2008
Springer
97views Cryptology» more  CTRSA 2008»
13 years 9 months ago
Public-Key Encryption with Non-interactive Opening
Ivan Damgård, Dennis Hofheinz, Eike Kiltz, R...
FC
2010
Springer
175views Cryptology» more  FC 2010»
13 years 9 months ago
Cryptographic Cloud Storage
We consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer. We...
Seny Kamara, Kristin Lauter
FC
2010
Springer
157views Cryptology» more  FC 2010»
13 years 9 months ago
A Framework for Understanding and Applying Ethical Principles in Network and Security Research
Current information and communications technology poses a variety of ethical challenges for researchers. In this paper, we present an intellectual framework for understanding and a...
Erin Kenneally, Michael Bailey, Douglas Maughan
FC
2010
Springer
260views Cryptology» more  FC 2010»
13 years 9 months ago
Lightweight Cryptography and DPA Countermeasures: A Survey
Abstract. The dawning Ubiquitous Computing age demands a new attacker model for the myriads of pervasive computing devices used: since a potentially malicious user is in full contr...
Amir Moradi, Axel Poschmann
FC
2010
Springer
180views Cryptology» more  FC 2010»
13 years 9 months ago
Lighten Encryption Schemes for Secure and Private RFID Systems
We provide several concrete implementations of a generic method given by Vaudenay to construct secure privacy-preserving RFID authentication and identification systems. More precis...
Sébastien Canard, Iwen Coisel, Jonathan Etr...