175
click to vote
TCC
15 years 8 months ago
2004 Springer
Abstract. We investigate whether it is possible to obtain any meaningful type of zero-knowledge proofs using a one-message (i.e., noninteractive) proof system. We show that, under ...
128
click to vote
EUROCRYPT
15 years 8 months ago
2004 Springer
Informally, a public-key steganography protocol allows two parties, who have never met or exchanged a secret, to send hidden messages over a public channel so that an adversary can...
145
click to vote
ACNS
15 years 8 months ago
2004 Springer
We present a practical protection mechanism against SQL injection attacks. Such attacks target databases that are accessible through a web frontend, and take advantage of flaws in...
126
click to vote
ACNS
15 years 8 months ago
2004 Springer
Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors includi...
146
click to vote
CHES
15 years 8 months ago
2004 Springer
Abstract. A classical model is used for the power consumption of cryptographic devices. It is based on the Hamming distance of the data handled with regard to an unknown but consta...
|