Embryos without secrets

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards security without secrets

Physical Unclonable Functions (PUFs) are a promising new cryptographic primitive that leverage manufacturing variation to create unclonable secrets in embedded systems. In this case, the secret is no longer stored permanently in digital form, but rather as the physical properties of the manufactured chip. Further, the recent proposal of "Public Model Physical Unclonable Functions" (PPUFs) does ...

متن کامل

Exchanging Secrets without Using Cryptography

We consider the problem where a group of n nodes, connected to the same broadcast channel (e.g., a wireless network), want to generate a common secret bitstream, in the presence of an adversary Eve, who tries to obtain information on the bitstream. We assume that the nodes initially share a (small) piece of information, but do not have access to any out-of-band channel. We ask the question: can...

متن کامل

Cryptography without (Hardly Any) Secrets ?

The absolute privacy of the secret-keys associated with cryptographic algorithms has been the corner-stone of modern cryptography. Still, in practice, keys do get compromised at times for a variety or reasons. A particularly disturbing loss of secrecy is as a result of side channel attacks. These attacks exploit the fact that every cryptographic algorithm is ultimately implemented on a physical...

متن کامل

SafeDeflate: compression without leaking secrets

CRIME[1] and BREACH[2] attacks on TLS/SSL leverage the fact that compression ratio is not hidden by encryption to recover content of secrets. We introduce SafeDeflate—a modification of a standard Deflate algorithm which compression ratio does not leak information about secret tokens. The modification is compatible with existing Deflate and gzip decompressors. We introduce a model in which attac...

متن کامل

Jam Resistant Communications without Shared Secrets

Information security is only attained when all four of the classic information assurance goals confidentiality, integrity, authenticity, and availability – are attained. The work presented focuses exclusively on the availability goal; in particular, maintaining the availability of the physical layer link in an omnidirectional wireless communications system. Hostile jamming is a direct attack on...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: European Journal of Medical Genetics

سال: 2013

ISSN: 1769-7212

DOI: 10.1016/j.ejmg.2012.10.013