Sciweavers

CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
13 years 10 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
CTRSA
2010
Springer
135views Cryptology» more  CTRSA 2010»
13 years 10 months ago
Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks
Shivam Bhasin, Sylvain Guilley, Laurent Sauvage, J...
CTRSA
2010
Springer
152views Cryptology» more  CTRSA 2010»
13 years 10 months ago
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryp...
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar,...
CTRSA
2010
Springer
211views Cryptology» more  CTRSA 2010»
14 years 17 days ago
Anonymity from Asymmetry: New Constructions for Anonymous HIBE
A Hierarchical Identity Based Encryption (HIBE) system is anonymous if the ciphertext reveals no information about the recipient’s identity. create it. While there are multiple c...
Léo Ducas
CTRSA
2010
Springer
232views Cryptology» more  CTRSA 2010»
14 years 2 months ago
On Extended Sanitizable Signature Schemes
Sanitizable signature schemes allow a semi-trusted entity to modify some specific portions of a signed message while keeping a valid signature of the original off-line signer. In...
Sébastien Canard, Amandine Jambert
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
CTRSA
2010
Springer
149views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Usable Optimistic Fair Exchange
Fairly exchanging digital content is an everyday problem. It has been shown that fair exchange cannot be done without a trusted third party (called the Arbiter). Yet, even with a ...
Alptekin Küpçü, Anna Lysyanskaya
CTRSA
2010
Springer
257views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Practical Key Recovery Attack against Secret-IV Edon-
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
Gaëtan Leurent
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
CTRSA
2010
Springer
212views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Fault Attacks Against emv Signatures
At ches 2009, Coron, Joux, Kizhvatov, Naccache and Paillier (cjknp) exhibited a fault attack against rsa signatures with partially known messages. This attack allows factoring the ...
Jean-Sébastien Coron, David Naccache, Mehdi...