Sciweavers

2967 search results - page 452 / 594
» Cryptology
Sort
View
ACNS
2003
Springer
132views Cryptology» more  ACNS 2003»
15 years 10 months ago
Trust on Web Browser: Attack vs. Defense
This paper proposes a browser spoofing attack which can break the weakest link from the server to user, i.e., man-computerinterface, and hence defeat the whole security system of ...
Tieyan Li, Yongdong Wu
ACNS
2003
Springer
123views Cryptology» more  ACNS 2003»
15 years 10 months ago
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards
Abstract. The use of biometrics, and fingerprint recognition in particular, for cardholder authentication in smartcard systems is growing in popularity, and such systems are the f...
Luciano Rila, Chris J. Mitchell
ACNS
2003
Springer
129views Cryptology» more  ACNS 2003»
15 years 10 months ago
Using Feedback to Improve Masquerade Detection
Abstract. To gain access to account privileges, an intruder masquerades as the proper account user. Information from user feedback helps to improve the accuracy of classifiers use...
Kwong H. Yung
CHES
2003
Springer
247views Cryptology» more  CHES 2003»
15 years 10 months ago
Very Compact FPGA Implementation of the AES Algorithm
Abstract. In this paper a compact FPGA architecture for the AES algorithm with 128-bit key targeted for low-cost embedded applications is presented. Encryption, decryption and key ...
Pawel Chodowiec, Kris Gaj
CHES
2003
Springer
88views Cryptology» more  CHES 2003»
15 years 10 months ago
A New Algorithm for Switching from Arithmetic to Boolean Masking
To protect a cryptographic algorithm against Differential Power Analysis, a general method consists in masking all intermediate data with a random value. When a cryptographic algo...
Jean-Sébastien Coron, Alexei Tchulkine