Sciweavers

677 search results - page 80 / 136
» Secure Pseudonymous Channels
Sort
View
ISADS
1999
IEEE
15 years 4 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
15 years 29 days ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
ICDCS
2008
IEEE
15 years 6 months ago
On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs
Null data frames are a special but important type of frames in IEEE 802.11 based Wireless Local Area Networks (e.g., 802.11 WLANs). They are widely used for power management, chan...
Wenjun Gu, Zhimin Yang, Can Que, Dong Xuan, Weijia...
RECONFIG
2008
IEEE
268views VLSI» more  RECONFIG 2008»
15 years 6 months ago
Parametric, Secure and Compact Implementation of RSA on FPGA
1 We present a fast, efficient, and parameterized modular multiplier and a secure exponentiation circuit especially intended for FPGAs on the low end of the price range. The desig...
Ersin Oksuzoglu, Erkay Savas
CORR
2008
Springer
118views Education» more  CORR 2008»
14 years 12 months ago
Security for Wiretap Networks via Rank-Metric Codes
The problem of securing a network coding communication system against a wiretapper adversary is considered. The network implements linear network coding to deliver n packets from s...
Danilo Silva, Frank R. Kschischang