Sciweavers

123 search results - page 2 / 25
» Secure implementations of typed channel abstractions
Sort
View
IOLTS
2005
IEEE
120views Hardware» more  IOLTS 2005»
13 years 10 months ago
Side-Channel Issues for Designing Secure Hardware Implementations
Selecting a strong cryptographic algorithm makes no sense if the information leaks out of the device through sidechannels. Sensitive information, such as secret keys, can be obtai...
Lejla Batina, Nele Mentens, Ingrid Verbauwhede
PADL
2004
Springer
13 years 10 months ago
An Implementation of Session Types
Abstract. A session type is an abstraction of a set of sequences of heterogeneous values sent and received over a communication channel. Session types can be used for specifying st...
Matthias Neubauer, Peter Thiemann
WAIFI
2010
Springer
158views Mathematics» more  WAIFI 2010»
13 years 2 months ago
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
Abstract. We focus on the implementation and security aspects of cryptographic protocols that use Type 1 and Type 4 pairings. On the implementation front, we report improved timing...
Sanjit Chatterjee, Darrel Hankerson, Alfred Meneze...
CARDIS
2008
Springer
106views Hardware» more  CARDIS 2008»
13 years 6 months ago
Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices
Abstract. In this paper we describe the first implementation on smartcard of the code-based authentication protocol proposed by Stern at Crypto'93 and we give a securization o...
Pierre-Louis Cayrel, Philippe Gaborit, Emmanuel Pr...
INFOCOM
2009
IEEE
13 years 11 months ago
Building Covert Channels over the Packet Reordering Phenomenon
Abstract—New modes of communication have shown themselves to be needed for more secure and private types of data. Steganography or data-hiding through covert channels can be high...
Adel El-Atawy, Ehab Al-Shaer