Sciweavers

12 search results - page 1 / 3
» On the Security of Cryptosystems with All-or-Nothing Transfo...
Sort
View
HOST
2009
IEEE
13 years 10 months ago
Secure IP-Block Distribution for Hardware Devices
—EDA vendors have proposed a standard for the sharing of IP among vendors to be used in the design and development of IP for FPGAs. Although, we do not propose any attacks, we sh...
Jorge Guajardo, Tim Güneysu, Sandeep S. Kumar...
ACNS
2004
Springer
106views Cryptology» more  ACNS 2004»
13 years 8 months ago
On the Security of Cryptosystems with All-or-Nothing Transform
We study the data privacy of cryptosystems with All-or-Nothing transform (AONT). An AONT is an efficient computable transform with two properties: Given all the bits of its output...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
CHES
2008
Springer
135views Cryptology» more  CHES 2008»
13 years 5 months ago
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform
At CHES 2006, a DPA countermeasure based on the Fourier Transform was published. This generic countermeasure aims at protecting from DPA any S-box calculation used in symmetric cry...
Jean-Sébastien Coron, Christophe Giraud, Em...
CTRSA
2001
Springer
121views Cryptology» more  CTRSA 2001»
13 years 7 months ago
REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform
a revised version of the extended abstract which appeared in The Cryptographers’ Track at RSA Conference ’2001 (8 – 12 april 2001, San Francisco, California, USA)
Tatsuaki Okamoto, David Pointcheval
ASIACRYPT
2010
Springer
13 years 1 months ago
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
sion of an extended abstract published in Proceedings of Asiacrypt 2010, Springer-Verlag, 2010. Available from the IACR Cryptology ePrint Archive as Report 2010/474. Beginning wit...
Sarah Meiklejohn, Hovav Shacham, David Mandell Fre...