Sciweavers

Share
IJISEC
2016
46views more  IJISEC 2016»
4 years 3 months ago
Link-time smart card code hardening
This paper presents a feasibility study to protect smart card software against fault-injection attacks by means of link-time code rewriting. This approach avoids the drawbacks of s...
Ronald De Keulenaer, Jonas Maebe, Koen De Bosscher...
IJISEC
2016
67views more  IJISEC 2016»
4 years 3 months ago
On selection of samples in algebraic attacks and a new technique to find hidden low degree equations
The best way of selecting samples in algebraic attacks against block ciphers is not well explored and understood. We introduce a simple strategy for selecting the plaintexts and de...
Petr Susil, Pouyan Sepehrdad, Serge Vaudenay, Nico...
IJISEC
2016
49views more  IJISEC 2016»
4 years 3 months ago
Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange revisited and more
Identity-based non-interactive key exchange (IB-NIKE) is a powerful but a bit overlooked primitive in identity-based cryptography. While identity-based encryption and signature ha...
Yu Chen, Qiong Huang, Zongyang Zhang
books