Sciweavers

677 search results - page 44 / 136
» Secure Pseudonymous Channels
Sort
View
IMCSIT
2010
14 years 7 months ago
Undetectable Spread-time Stegosystem Based on Noisy Channels
We consider a scenario where an attacker is able to receive a stegosignal only over a Gaussian channel. But in order to provide security of this channel noise
Valery I. Korzhik, Guillermo Morales-Luna, Ksenia ...
SP
2006
IEEE
109views Security Privacy» more  SP 2006»
15 years 3 months ago
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit “0” into a bi...
Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, R...
ISCA
2007
IEEE
167views Hardware» more  ISCA 2007»
15 years 4 months ago
New cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks that mostly target embedded cryptographic devices,...
Zhenghong Wang, Ruby B. Lee
TIT
2010
110views Education» more  TIT 2010»
14 years 4 months ago
Secure communications with insecure feedback: breaking the high-SNR ceiling
A multiple-antenna Gaussian wiretap channel in which the number of antennas at the source is not greater than that at the eavesdropper is considered. Without feedback, the secrecy...
Tùng T. Kim, H. Vincent Poor
SBCCI
2005
ACM
136views VLSI» more  SBCCI 2005»
15 years 3 months ago
Current mask generation: a transistor level security against DPA attacks
The physical implementation of cryptographic algorithms may leak to some attacker security information by the side channel data, as power consumption, timing, temperature or elect...
Daniel Mesquita, Jean-Denis Techer, Lionel Torres,...