Sciweavers

137
Voted
FC
2010
Springer
196views Cryptology» more  FC 2010»
15 years 8 months ago
Secure Multiparty AES
Abstract We propose several variants of a secure multiparty computation protocol for AES encryption. The best variant requires 2200 + 400 255 expected elementary operations in expe...
Ivan Damgård, Marcel Keller
FC
2010
Springer
183views Cryptology» more  FC 2010»
15 years 8 months ago
Automatically Preparing Safe SQL Queries
We present the first sound program source transformation approach for automatically transforming the code of a legacy web application to employ PREPARE statements in place of unsa...
Prithvi Bisht, A. Prasad Sistla, V. N. Venkatakris...
FC
2010
Springer
135views Cryptology» more  FC 2010»
15 years 8 months ago
Multichannel Protocols to Prevent Relay Attacks
A number of security systems, from Chip-and-PIN payment cards to contactless subway and train tokens, as well as secure localization systems, are vulnerable to relay attacks. Encry...
Frank Stajano, Ford-Long Wong, Bruce Christianson
98
Voted
FC
2010
Springer
194views Cryptology» more  FC 2010»
15 years 8 months ago
PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure
Dan Kaminsky, Meredith L. Patterson, Len Sassaman
138
Voted
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 8 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore