Sciweavers

1019 search results - page 65 / 204
» Cryptographic Design Vulnerabilities
Sort
View
ISCA
2007
IEEE
167views Hardware» more  ISCA 2007»
15 years 10 months ago
New cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks that mostly target embedded cryptographic devices,...
Zhenghong Wang, Ruby B. Lee
91
Voted
ICS
2010
Tsinghua U.
15 years 8 months ago
Robust Perfect Revenue From Perfectly Informed Players
: Maximizing revenue in the presence of perfectly informed players is a well known goal in mechanism design. Yet, all current mechanisms for this goal are vulnerable to equilibrium...
Jing Chen, Avinatan Hassidim, Silvio Micali
149
Voted
TDSC
2008
119views more  TDSC 2008»
15 years 3 months ago
Architectural Risk Analysis of Software Systems Based on Security Patterns
The importance of software security has been profound, since most attacks to software systems are based on vulnerabilities caused by poorly designed and developed software. Further...
Spyros T. Halkidis, Nikolaos Tsantalis, Alexander ...
FC
2010
Springer
181views Cryptology» more  FC 2010»
15 years 7 months ago
Design and Implementation of a Key-Lifecycle Management System
Key management is the Achilles’ heel of cryptography. This work presents a novel Key-Lifecycle Management System (KLMS), which addresses two issues that have not been addressed ...
Mathias Björkqvist, Christian Cachin, Robert ...
CCS
2007
ACM
15 years 10 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...