159
click to vote
CHES
15 years 7 months ago
2006 Springer
This article starts with a discussion of three different attacks on masked AES hardware implementations. This discussion leads to the conclusion that glitches in masked circuits po...
149
click to vote
ACNS
15 years 7 months ago
2006 Springer
In this paper we combine the error correction and encryption functionality into one block cipher, which we call High Diffusion (HD) cipher. The error correcting property of this ci...
157
click to vote
CRYPTO
15 years 7 months ago
2006 Springer
Abstract. We introduce algebraic geometric techniques in secret sharing and in secure multi-party computation (MPC) in particular. The main result is a linear secret sharing scheme...
128
Voted
CRYPTO
15 years 7 months ago
2006 Springer
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the...
129
click to vote
CHES
15 years 7 months ago
2006 Springer
Balanced dynamic dual-rail gates and asynchronous circuits have been shown, if implemented correctly, to have natural and efficient resistance to side-channel attacks. Despite thei...
|