Sciweavers

258 search results - page 18 / 52
» Securing Provenance
Sort
View
134
Voted
TODAES
2011
107views more  TODAES 2011»
14 years 10 months ago
Scan-based attacks on linear feedback shift register based stream ciphers
—In this paper, we present an attack on stream cipher implementations by determining the scan chain structure of the linear feedback shift registers in their implementations. Alt...
Yu Liu, Kaijie Wu, Ramesh Karri
126
Voted
IJHPCN
2008
63views more  IJHPCN 2008»
15 years 3 months ago
On the secure creation, organisation and discovery of topics in distributed publish/subscribe systems
: Publish/Subscribe infrastructures have gained significant traction recently with several specifications such as the Java Message Service (JMS), WS-Eventing and WS-Notification. I...
Shrideep Pallickara, Geoffrey Fox, Harshawardhan G...
133
Voted
DATE
2006
IEEE
109views Hardware» more  DATE 2006»
15 years 9 months ago
A secure scan design methodology
It has been proven that scan path is a potent hazard for secure chips. Scan based attacks have been recently demonstrated against DES or AES and several solutions have been presen...
David Hély, Frédéric Bancel, ...
142
Voted
ICICS
2010
Springer
15 years 1 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
CCS
2010
ACM
15 years 6 days ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...