174
click to vote
CTRSA
9 years 8 months ago
2016 Springer
With the growing popularity of remote storage, the ability to outsource a large private database yet be able to search on this encrypted data is critical. Searchable symmetric encr...
CTRSA
9 years 8 months ago
2016 Springer 100
click to vote
CTRSA
9 years 8 months ago
2016 Springer
Authentication and authenticated encryption with associated data (AEAD) are applied in cryptographic protocols to provide message integrity. The definitions in the literature and...
102
click to vote
CTRSA
9 years 8 months ago
2016 Springer
Abstract. Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications for securing communication channels. In this paper, we make the follo...
CTRSA
9 years 8 months ago
2016 Springer
We present the first physical side-channel attack on elliptic curve cryptography running on a PC. The attack targets the ECDH public-key encryption algorithm, as implemented in t...
|