Sciweavers

1777 search results - page 183 / 356
» Programming Cryptographic Protocols
Sort
View
IFIP
2004
Springer
15 years 6 months ago
Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards
This paper focuses on the usability of the PINPAS tool. The PINPAS tool is an instruction-level interpreter for smartcard assembler languages, augmented with facilities to study si...
Jerry den Hartog, Erik P. de Vink
CASES
2009
ACM
15 years 6 months ago
Automatic detection of fault attack and countermeasures
Security of smart cards is continuously threatened by many software and hardware attacks. Those attacks focus on giving secret information that are stored in the card like PIN cod...
Ahmadou A. Sere, Julien Iguchi-Cartigny, Jean-Loui...
FSE
1993
Springer
101views Cryptology» more  FSE 1993»
15 years 5 months ago
SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm
: A new non-proprietary secret-key block-enciphering algorithm, SAFER K-64 (for Secure And Fast Encryption Routine with a Key of length 64 bits) is described. The blocklength is 64...
James L. Massey
IJNSEC
2007
154views more  IJNSEC 2007»
15 years 1 months ago
Integrity of mobile agents: a new approach
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and ...
Aneta Zwierko, Zbigniew Kotulski
ICC
2007
IEEE
133views Communications» more  ICC 2007»
15 years 7 months ago
Application Composition in the SIP Servlet Environment
—The SIP servlet standard is a popular Java application programming interface (API) for developing and deploying Session Initiation Protocol (SIP) applications in Voice over IP (...
Eric Cheung, K. Hal Purdy