Sciweavers

22 search results - page 2 / 5
» Experimenting with Shared Generation of RSA Keys
Sort
View
FPL
2008
Springer
157views Hardware» more  FPL 2008»
13 years 5 months ago
Chosen-message SPA attacks against FPGA-based RSA hardware implementations
This paper presents SPA (Simple Power Analysis) attacks against public-key cryptosystems implemented on an FPGA platform. The SPA attack investigates a power waveform generated by...
Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Ak...
INFOCOM
2011
IEEE
12 years 7 months ago
Adaptive wireless channel probing for shared key generation
—Generating a shared key between two parties from the wireless channel is of increasing interest. The procedure for obtaining information from wireless channel is called channel ...
Yunchuan Wei, Kai Zeng, Prasant Mohapatra
CHES
2000
Springer
114views Cryptology» more  CHES 2000»
13 years 8 months ago
Efficient Generation of Prime Numbers
The generation of prime numbers underlies the use of most public-key schemes, essentially as a major primitive needed for the creation of key pairs or as a computation stage appear...
Marc Joye, Pascal Paillier, Serge Vaudenay
SASO
2008
IEEE
13 years 10 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
WER
2001
Springer
13 years 8 months ago
Requirements Processes: An Experience Report
Processes are certainly a key element in software management. Defining and using processes is believed to be an important factor towards quality. Our paper describes a general pro...
Julio Cesar Sampaio do Prado Leite, Soeli T. Fiori...