Sciweavers

33
Voted
IJISEC
2016
46views more  IJISEC 2016»
10 years 10 days ago
Link-time smart card code hardening
This paper presents a feasibility study to protect smart card software against fault-injection attacks by means of link-time code rewriting. This approach avoids the drawbacks of s...
Ronald De Keulenaer, Jonas Maebe, Koen De Bosscher...
IJISEC
2016
67views more  IJISEC 2016»
10 years 10 days ago
On selection of samples in algebraic attacks and a new technique to find hidden low degree equations
The best way of selecting samples in algebraic attacks against block ciphers is not well explored and understood. We introduce a simple strategy for selecting the plaintexts and de...
Petr Susil, Pouyan Sepehrdad, Serge Vaudenay, Nico...
IJISEC
2016
49views more  IJISEC 2016»
10 years 10 days ago
Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange revisited and more
Identity-based non-interactive key exchange (IB-NIKE) is a powerful but a bit overlooked primitive in identity-based cryptography. While identity-based encryption and signature ha...
Yu Chen, Qiong Huang, Zongyang Zhang