Sciweavers

73 search results - page 1 / 15
» Security of erasable memories against adaptive adversaries
Sort
View
STORAGESS
2005
ACM
13 years 10 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
IACR
2011
86views more  IACR 2011»
12 years 4 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
CHES
2005
Springer
281views Cryptology» more  CHES 2005»
13 years 10 months ago
Data Remanence in Flash Memory Devices
Data remanence is the residual physical representation of data that has been erased or overwritten. In non-volatile programmable devices, such as UV EPROM, EEPROM or Flash, bits ar...
Sergei P. Skorobogatov
EUROCRYPT
2000
Springer
13 years 8 months ago
Confirmer Signature Schemes Secure against Adaptive Adversaries
Jan Camenisch, Markus Michels
EUROCRYPT
2006
Springer
13 years 8 months ago
Private Circuits II: Keeping Secrets in Tamperable Circuits
Abstract. Motivated by the problem of protecting cryptographic hardware, we continue the investigation of private circuits initiated in [16]. In this work, our aim is to construct ...
Yuval Ishai, Manoj Prabhakaran, Amit Sahai, David ...