Sciweavers

2108 search results - page 262 / 422
» Encrypted
Sort
View
CHES
2007
Springer
110views Cryptology» more  CHES 2007»
15 years 10 months ago
RFID Noisy Reader How to Prevent from Eavesdropping on the Communication?
RFID applications do not always use encryption to ensure the security as public key cryptographic algorithms that are costly in term of computing resources. We proposed to secure t...
O. Savry, F. Pebay-Peyroula, F. Dehmas, G. Robert,...
ER
2007
Springer
163views Database» more  ER 2007»
15 years 10 months ago
Know your Limits: Enhanced XML Modeling with Cardinality Constraints
XML Schema supports the specification of occurrence constraints by declaring values for its min/maxOccurs attributes. These constraints are structural in the sense that they rest...
Sebastian Link, Thu Trinh
FPL
2007
Springer
154views Hardware» more  FPL 2007»
15 years 10 months ago
Physical Unclonable Functions, FPGAs and Public-Key Crypto for IP Protection
In recent years, IP protection of FPGA hardware designs has become a requirement for many IP vendors. To this end solutions have been proposed based on the idea of bitstream encry...
Jorge Guajardo, Sandeep Kumar, Geert Jan Schrijen,...
FROCOS
2007
Springer
15 years 10 months ago
Combining Algorithms for Deciding Knowledge in Security Protocols
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Mathilde Arnaud, Véronique Cortier, St&eacu...
FSE
2007
Springer
136views Cryptology» more  FSE 2007»
15 years 10 months ago
New Lightweight DES Variants
In this paper we propose a new block cipher, DESL (DES Lightweight), which is based on the classical DES (Data Encryption Standard) design, but unlike DES it uses a single S-box re...
Gregor Leander, Christof Paar, Axel Poschmann, Kai...