Sciweavers

FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
14 years 15 days ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
FC
2009
Springer
95views Cryptology» more  FC 2009»
14 years 15 days ago
Secure Multiparty Computation Goes Live
In this note, we report on the first large-scale and practical application of secure multiparty computation, which took place in January 2008. We also report on the novel cryptogr...
Peter Bogetoft, Dan Lund Christensen, Ivan Damg&ar...
FC
2009
Springer
109views Cryptology» more  FC 2009»
14 years 15 days ago
Optimised to Fail: Card Readers for Online Banking
Abstract. The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used toge...
Saar Drimer, Steven J. Murdoch, Ross J. Anderson
FC
2009
Springer
99views Cryptology» more  FC 2009»
14 years 15 days ago
Optical DNA
Abstract. A certificate of authenticity (COA) is an inexpensive physical object with a random and unique structure S which is hard to nearexactly replicate. An inexpensive device ...
Deepak Vijaywargi, Dave Lewis, Darko Kirovski
FC
2009
Springer
100views Cryptology» more  FC 2009»
14 years 15 days ago
Relations Among Privacy Notions
This paper presents a hierarchy of privacy notions that covers multiple anonymity and unlinkability variants. The underlying definitions, which are based on the idea of indistingu...
Jens-Matthias Bohli, Andreas Pashalidis
FC
2009
Springer
118views Cryptology» more  FC 2009»
14 years 15 days ago
Cryptographic Combinatorial Clock-Proxy Auctions
We present a cryptographic protocol for conducting efficient, provably correct and secrecy-preserving combinatorial clock-proxy auctions. The “clock phase” functions as a trust...
David C. Parkes, Michael O. Rabin, Christopher Tho...
FC
2009
Springer
92views Cryptology» more  FC 2009»
14 years 15 days ago
Deterring Online Advertising Fraud through Optimal Payment in Arrears
Online advertisers face substantial difficulty in selecting and supervising small advertising partners: Fraud can be well-hidden, and limited reputation systems reduce accountabili...
Benjamin Edelman
FC
2009
Springer
93views Cryptology» more  FC 2009»
14 years 15 days ago
Coercion Resistant End-to-end Voting
End-to-end voting schemes have shown considerable promise for allowing voters to verify that tallies are accurate. At the same time, the threat of coercion has generally been consi...
Ryan W. Gardner, Sujata Garera, Aviel D. Rubin
FC
2009
Springer
93views Cryptology» more  FC 2009»
14 years 15 days ago
Investments and Trade-offs in the Economics of Information Security
Christos Ioannidis, David J. Pym, Julian Williams