Sciweavers

631 search results - page 8 / 127
» Intrusion-Resilient Secure Channels
Sort
View
IJNSEC
2010
128views more  IJNSEC 2010»
14 years 6 months ago
New Efficient Searchable Encryption Schemes from Bilinear Pairings
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...
Chunxiang Gu, Yuefei Zhu
TIT
2010
88views Education» more  TIT 2010»
14 years 6 months ago
Multiple-Input Multiple-Output Gaussian Broadcast Channels With Common and Confidential Messages
This paper considers the problem of the multiple-input multiple-output (MIMO) Gaussian broadcast channel with two receivers (receivers 1 and 2) and two messages: a common message ...
Hung D. Ly, Tie Liu, Yingbin Liang
CHES
2011
Springer
254views Cryptology» more  CHES 2011»
13 years 11 months ago
Extractors against Side-Channel Attacks: Weak or Strong?
Randomness extractors are important tools in cryptography. Their goal is to compress a high-entropy source into a more uniform output. Beyond their theoretical interest, they have ...
Marcel Medwed, François-Xavier Standaert
BIRTHDAY
2012
Springer
13 years 7 months ago
Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders
We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the intersection between One-Time Programs and Boolean masking schemes. First, we show t...
François-Xavier Standaert, Christophe Petit...