Sciweavers

930 search results - page 23 / 186
» A Universal Encryption Standard
Sort
View
DATE
2007
IEEE
92views Hardware» more  DATE 2007»
15 years 8 months ago
Overcoming glitches and dissipation timing skews in design of DPA-resistant cryptographic hardware
Cryptographic embedded systems are vulnerable to Differential Power Analysis (DPA) attacks. In this paper, we propose a logic design style, called as Precharge Masked Reed-Muller ...
Kuan Jen Lin, Shan Chien Fang, Shih Hsien Yang, Ch...
CCS
2007
ACM
15 years 8 months ago
Chosen-ciphertext secure proxy re-encryption
In a proxy re-encryption (PRE) scheme, a proxy is given special information that allows it to translate a ciphertext under one key into a ciphertext of the same message under a di...
Ran Canetti, Susan Hohenberger
82
Voted
EUROPKI
2004
Springer
15 years 7 months ago
Flexible and Scalable Public Key Security for SSH
Abstract. A standard tool for secure remote access, the SSH protocol uses publickey cryptography to establish an encrypted and integrity-protected channel with a remote server. How...
Yasir Ali, Sean W. Smith
INDOCRYPT
2004
Springer
15 years 7 months ago
The Security and Performance of the Galois/Counter Mode (GCM) of Operation
Abstract. The recently introduced Galois/Counter Mode (GCM) of operation for block ciphers provides both encryption and message authentication, using universal hashing based on mul...
David A. McGrew, John Viega
CCS
2010
ACM
15 years 1 months ago
A new framework for efficient password-based authenticated key exchange
Protocols for password-based authenticated key exchange (PAKE) allow two users who share only a short, low-entropy password to agree on a cryptographically strong session key. The...
Adam Groce, Jonathan Katz