Sciweavers

631 search results - page 28 / 127
» Intrusion-Resilient Secure Channels
Sort
View
ESORICS
2009
Springer
15 years 8 months ago
Hide and Seek in Time - Robust Covert Timing Channels
Abstract. Covert timing channels aim at transmitting hidden messages by controlling the time between transmissions of consecutive payload packets in overt network communication. Pr...
Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-...
CANS
2006
Springer
129views Cryptology» more  CANS 2006»
15 years 5 months ago
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Pairings on elliptic curves have been used as cryptographic primitives for the development of new applications such as identity based schemes. For the practical applications, it is...
Tae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Wo...
CCS
2010
ACM
15 years 2 months ago
Predictive black-box mitigation of timing channels
We investigate techniques for general black-box mitigation of timing channels. The source of events is wrapped by a timing mitigator that delays output events so that they contain...
Aslan Askarov, Danfeng Zhang, Andrew C. Myers
CORR
2007
Springer
109views Education» more  CORR 2007»
15 years 1 months ago
The MIMOME Channel
— The MIMOME channel is a Gaussian wiretap channel in which the sender, receiver, and eavesdropper all have multiple antennas. We characterize the secrecy capacity as the saddle-...
Ashish Khisti, Gregory W. Wornell
IJNSEC
2006
131views more  IJNSEC 2006»
15 years 1 months ago
A Frobenius Map Approach for an Efficient and Secure Multiplication on Koblitz
The most efficient technique for protecting the using Frobenius algorithms for scalar multiplication on Koblitz curves against the Side Channel Attacks seems to be the multiplier ...
Mustapha Hedabou