This paper presents a feasibility study to protect smart card software against fault-injection attacks by means of link-time code rewriting. This approach avoids the drawbacks of s...
Ronald De Keulenaer, Jonas Maebe, Koen De Bosscher...
The best way of selecting samples in algebraic attacks against block ciphers is not well explored and understood. We introduce a simple strategy for selecting the plaintexts and de...
Petr Susil, Pouyan Sepehrdad, Serge Vaudenay, Nico...
Identity-based non-interactive key exchange (IB-NIKE) is a powerful but a bit overlooked primitive in identity-based cryptography. While identity-based encryption and signature ha...