Sciweavers

677 search results - page 26 / 136
» Secure Pseudonymous Channels
Sort
View
72
Voted
DATE
2005
IEEE
122views Hardware» more  DATE 2005»
15 years 3 months ago
A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs
Kris Tiri, Ingrid Verbauwhede
IOLTS
2005
IEEE
120views Hardware» more  IOLTS 2005»
15 years 3 months ago
Side-Channel Issues for Designing Secure Hardware Implementations
Selecting a strong cryptographic algorithm makes no sense if the information leaks out of the device through sidechannels. Sensitive information, such as secret keys, can be obtai...
Lejla Batina, Nele Mentens, Ingrid Verbauwhede
ACNS
2005
Springer
79views Cryptology» more  ACNS 2005»
15 years 3 months ago
Intrusion-Resilient Secure Channels
Gene Itkis, Robert McNerney, Scott Russell
68
Voted
TCC
2005
Springer
90views Cryptology» more  TCC 2005»
15 years 3 months ago
A Universally Composable Secure Channel Based on the KEM-DEM Framework
Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto