Sciweavers

CTRSA
2010
Springer
135views Cryptology» more  CTRSA 2010»
15 years 8 months ago
Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks
Shivam Bhasin, Sylvain Guilley, Laurent Sauvage, J...
CTRSA
2010
Springer
152views Cryptology» more  CTRSA 2010»
15 years 8 months ago
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryp...
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar,...
CSR
2010
Springer
15 years 8 months ago
Sofic and Almost of Finite Type Tree-Shifts
We introduce the notion of sofic tree-shifts which corresponds to symbolic dynamical systems of infinite trees accepted by finite tree automata. We show that, contrary to shifts of...
Nathalie Aubrun, Marie-Pierre Béal
CSR
2010
Springer
15 years 8 months ago
A SAT Based Effective Algorithm for the Directed Hamiltonian Cycle Problem
Abstract. The Hamiltonian cycle problem (HCP) is an important combinatorial problem with applications in many areas. While thorough theoretical and experimental analyses have been ...
Gerold Jäger, Weixiong Zhang
CSFW
2010
IEEE
15 years 8 months ago
A Game-Based Definition of Coercion-Resistance and Its Applications
Coercion-resistance is one of the most important and intricate security requirements for voting protocols. Several definitions of coercion-resistance have posed in the literature,...
Ralf Küsters, Tomasz Truderung, Andreas Vogt