Sciweavers

4340 search results - page 82 / 868
» Formal Methods and Cryptography
Sort
View
136
Voted
FDTC
2009
Springer
191views Cryptology» more  FDTC 2009»
15 years 10 months ago
Protecting RSA against Fault Attacks: The Embedding Method
—Fault attacks constitute a major threat toward cryptographic products supporting RSA-based technologies. Most often, the public exponent is unknown, turning resistance to fault ...
Marc Joye
93
Voted
COMPSEC
2000
117views more  COMPSEC 2000»
15 years 3 months ago
Methods for Protecting Password Transmission
Peyravian and Zunic (2000) proposed a password transmission scheme and a password change scheme over an insecure network. Their proposed solutions do not require the use of any sym...
Mohammad Peyravian, Nevenko Zunic
134
Voted
ESOP
2008
Springer
15 years 5 months ago
A Formal Implementation of Value Commitment
In an optimistic approach to security, one can often simplify protocol design by relying on audit logs, which can be analyzed a posteriori. Such auditing is widely used in practice...
Cédric Fournet, Nataliya Guts, Francesco Za...
148
Voted
CTRSA
2005
Springer
78views Cryptology» more  CTRSA 2005»
15 years 9 months ago
New Minimal Weight Representations for Left-to-Right Window Methods
For an integer w ≥ 2, a radix 2 representation is called a width-w nonadjacent form (w-NAF, for short) if each nonzero digit is an odd integer with absolute value less than 2w−...
James A. Muir, Douglas R. Stinson
128
Voted
ACNS
2006
Springer
112views Cryptology» more  ACNS 2006»
15 years 9 months ago
Password Based Server Aided Key Exchange
We propose a new password-based 3-party protocol with a formal security proof in the standard model. Under reasonable assumptions we show that our new protocol is more efficient t...
Yvonne Cliff, Yiu Shing Terry Tin, Colin Boyd