نتایج جستجو برای: tamper resilient cryptography

تعداد نتایج: 54844  

2013
David Galindo Srinivas Vivek

Leakage-resilient cryptography aims at capturing side-channel attacks within the provable security framework. Currently there exists a plethora of schemes with provably secure guarantees against a variety of side-channel attacks. However, meeting the strongest security levels (resilience against continual leakage attacks) under the weakest assumptions leads currently to costly schemes. Addition...

2013
Georg Nawratil

We transfer the basic idea of bonds, introduced by Hegedüs, Schicho and Schröcker for overconstrained closed chains with rotational joints, to the theory of self-motions of parallel manipulators of Stewart Gough type. Moreover we present some basic facts and results on bonds and demonstrate the potential of this theory on the basis of several examples. As a by-product we give a geometric charac...

2005
Elizabeth Haubert Joseph Tucek Larry Brumbaugh William Yurcik

Tamper-resistant storage techniques provide varying degrees of authenticity and integrity for data. This paper surveys five implemented tamper-resistant storage systems that use encryption, cryptographic hashes, digital signatures and error-correction primitives to provide varying levels of data protection. Five key evaluation points for such systems are: (1) authenticity guarantees, (2) integr...

2014
Lisa Bruttel

This paper presents results from an experiment on the effects of retail-price recommendations (RPRs) on consumer and retailer behavior. Despite their non-binding nature, RPRs may influence consumers’ willingness to pay by setting a reference point. Loss averse consumers will then be reluctant to pay a price higher than the recommended one. Furthermore, at a given price level consumers will dema...

Journal: :IACR Cryptology ePrint Archive 2009
Paulo Mateus Serge Vaudenay

Tamper-proof devices are pretty powerful. They typically make security applications simpler (provided that the tamper-proof assumption is not violated). For application requiring privacy, we observe that some properties may become harder (if possible at all) to achieve when devices are maliciously used. We take the example of deniability, receiptfreeness, and anonymity. We formalize the trusted...

Journal: :Jurnal Teknik Informatika 2023

In recent years, internet user was grown significantly. Even though many problems arise due to abuse. The sectors affected by the is digital assets or right. Various ways are done solve violation. One of that develop protection Digital Right Management (DRM). However, DRM technology has several disadvantages such as there no way track leak and prove a copyright violation, unable authenticate co...

2014
T. Nataraj S. K. Mahalingam

Security has emerged as the most feared aspect of cloud computing and a major hindrance for the customers. In existing system for establishing secure and privacy-assured service outsourcing in cloud computing which uses Linear programming and compressed sensing techniques to transform images, which aims to take security, complexity, and efficiency into consideration from the very beginning of t...

2009
Harald Vogt

Wireless sensor networks are comprised of large numbers of resource-constrained and wirelessly communicating computing devices. Advances in computing and communication technology have made it possible to integrate sensing capabilities, wireless communication interfaces, and microprocessors into tiny devices that allow to embed compuational power in arbitrary environments. The applications of wi...

2000
Ingrid Biehl Bernd Meyer Volker Müller

In this paper we extend the ideas for differential fault attacks on the RSA cryptosystem (see [4]) to schemes using elliptic curves. We present three different types of attacks that can be used to derive information about the secret key if bit errors can be inserted into the elliptic curve computations in a tamper-proof device. The effectiveness of the attacks was proven in a software simulatio...

2000
Arnd Weber

As electronic commerce will increase, players will increasingly wish to have signed documents and strong encryption. According to current knowledge, it must be expected that the costs of attacking, through Trojan horses, crypto impleme ntations on computers with mainstream operating systems, are low. This threatens legal certainty, either because such Trojan horses will emerge, or because their...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید