Sciweavers

105 search results - page 12 / 21
» Towards generating secure keys for braid cryptography
Sort
View
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
16 years 5 days ago
An Efficient Method for Random Delay Generation in Embedded Software
Random delays are a countermeasure against a range of side channel and fault attacks that is often implemented in embedded software. We propose a new method for generation of rando...
Ilya Kizhvatov, Jean-Sébastien Coron
CHES
2006
Springer
133views Cryptology» more  CHES 2006»
15 years 3 months ago
Fast Generation of Prime Numbers on Portable Devices: An Update
The generation of prime numbers underlies the use of most public-key cryptosystems, essentially as a primitive needed for the creation of RSA key pairs. Surprisingly enough, despit...
Marc Joye, Pascal Paillier
TCC
2007
Springer
124views Cryptology» more  TCC 2007»
15 years 5 months ago
Tackling Adaptive Corruptions in Multicast Encryption Protocols
We prove a computational soundness theorem for symmetric-key encryption protocols that can be used to analyze security against adaptively corrupting adversaries (that is, adversar...
Saurabh Panjwani
DBSEC
2008
137views Database» more  DBSEC 2008»
15 years 1 months ago
Towards Automation of Testing High-Level Security Properties
Abstract. Many security problems only become apparent after software is deployed, and in many cases a failure has occurred prior to the awareness of the problem. Although many woul...
Aiman Hanna, Hai Zhou Ling, Jason Furlong, Mourad ...
COMPLEX
2009
Springer
15 years 6 months ago
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing
Security vendors are facing a serious problem of defeating the complexity of malwares. With the popularity and the variety of zeroday malware over the Internet, generating their si...
Wei Yan, Erik Wu