Sciweavers

631 search results - page 26 / 127
» Intrusion-Resilient Secure Channels
Sort
View
IOLTS
2005
IEEE
120views Hardware» more  IOLTS 2005»
15 years 7 months ago
Side-Channel Issues for Designing Secure Hardware Implementations
Selecting a strong cryptographic algorithm makes no sense if the information leaks out of the device through sidechannels. Sensitive information, such as secret keys, can be obtai...
Lejla Batina, Nele Mentens, Ingrid Verbauwhede
94
Voted
TCC
2005
Springer
90views Cryptology» more  TCC 2005»
15 years 7 months ago
A Universally Composable Secure Channel Based on the KEM-DEM Framework
Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto
CP
2000
Springer
15 years 6 months ago
Constraints, Inference Channels and Secure Databases
Alexander Brodsky, Csilla Farkas, Duminda Wijeseke...
CHES
2006
Springer
75views Cryptology» more  CHES 2006»
15 years 5 months ago
Towards Security Limits in Side-Channel Attacks
François-Xavier Standaert, Eric Peeters, C&...