Sciweavers

Share
WISA
2009
Springer
9 years 1 months ago
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment
We introduce low-cost hardware for performing non-invasive side-channel attacks on Radio Frequency Identication Devices (RFID) and develop techniques for facilitating a correlatio...
Timo Kasper, David Oswald, Christof Paar
WISA
2009
Springer
9 years 3 months ago
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application
In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), a user secret key is associated with a set of attributes, and the ciphertext is associated with an access policy over attr...
Luan Ibraimi, Milan Petkovic, Svetla Nikova, Piete...
WISA
2009
Springer
9 years 3 months ago
A Comparative Study of Mutual Information Analysis under a Gaussian Assumption
In CHES 2008 a generic side-channel distinguisher, Mutual Information, has been introduced to be independent of the relation between measurements and leakages as well as between le...
Amir Moradi, Nima Mousavi, Christof Paar, Mahmoud ...
WISA
2009
Springer
9 years 3 months ago
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation
Power analysis has shown to be successful in breaking symmetric cryptographic algorithms implemented on low resource devices. Prompted by the breaking of many protected implementat...
J. Pan, J. I. den Hartog, Jiqiang Lu
WISA
2009
Springer
9 years 3 months ago
When Compromised Readers Meet RFID
RFID-based access control solutions for mobile environments, e.g. ticketing systems for sport events, commonly rely on readers that are not continuously connected to the back-end s...
Gildas Avoine, Cédric Lauradoux, Tania Mart...
WISA
2009
Springer
9 years 3 months ago
Unknown Plaintext Template Attacks
In this paper we present a variation of the template attack classiļ¬cation process that can be applied to block ciphers when the plaintext and ciphertext used are unknown. In a na...
Neil Hanley, Michael Tunstall, William P. Marnane
WISA
2009
Springer
9 years 3 months ago
Securing Remote Access Inside Wireless Mesh Networks
Wireless mesh networks (WMNs) that are being increasingly deployed in communities and public places provide a relatively stable routing infrastructure and can be used for diverse c...
Mark Manulis
books