Sciweavers

49 search results - page 2 / 10
» Low Cost Attacks on Tamper Resistant Devices
Sort
View
IMA
2003
Springer
97views Cryptology» more  IMA 2003»
13 years 11 months ago
Remote User Authentication Using Public Information
A method for remote user authentication is proposed that requires only public information to be stored at the verifying host. Like the S/KEY scheme, the new technique uses only sym...
Chris J. Mitchell
ECIS
2000
13 years 7 months ago
Full Bindingness and Confidentiality
As electronic commerce will increase, players will increasingly wish to have signed documents and strong encryption. According to current knowledge, it must be expected that the co...
Arnd Weber
CHES
2007
Springer
111views Cryptology» more  CHES 2007»
13 years 12 months ago
TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks
Replay attacks are often the most costly attacks to thwart when dealing with off-chip memory integrity. With a trusted System-on-Chip, the existing countermeasures against replay r...
Reouven Elbaz, David Champagne, Ruby B. Lee, Lione...
JEI
2007
88views more  JEI 2007»
13 years 5 months ago
Wavelet-based fragile watermarking scheme for image authentication
In this work, we propose a novel fragile watermarking scheme in wavelet transform domain, which is sensitive to all kinds of manipulations and has the ability to localize the tamp...
Chang-Tsun Li, Huayin Si
ATS
2005
IEEE
144views Hardware» more  ATS 2005»
13 years 11 months ago
On Detection of Resistive Bridging Defects by Low-Temperature and Low-Voltage Testing
—Test application at reduced power supply voltage (low-voltage testing) or reduced temperature (low-temperature testing) can improve the defect coverage of a test set, particular...
Sandip Kundu, Piet Engelke, Ilia Polian, Bernd Bec...