نتایج جستجو برای: tamper resilient cryptography
تعداد نتایج: 54844 فیلتر نتایج به سال:
Leakage-resilient cryptography aims at capturing side-channel attacks within the provable security framework. Currently there exists a plethora of schemes with provably secure guarantees against a variety of side-channel attacks. However, meeting the strongest security levels (resilience against continual leakage attacks) under the weakest assumptions leads currently to costly schemes. Addition...
We transfer the basic idea of bonds, introduced by Hegedüs, Schicho and Schröcker for overconstrained closed chains with rotational joints, to the theory of self-motions of parallel manipulators of Stewart Gough type. Moreover we present some basic facts and results on bonds and demonstrate the potential of this theory on the basis of several examples. As a by-product we give a geometric charac...
Tamper-resistant storage techniques provide varying degrees of authenticity and integrity for data. This paper surveys five implemented tamper-resistant storage systems that use encryption, cryptographic hashes, digital signatures and error-correction primitives to provide varying levels of data protection. Five key evaluation points for such systems are: (1) authenticity guarantees, (2) integr...
This paper presents results from an experiment on the effects of retail-price recommendations (RPRs) on consumer and retailer behavior. Despite their non-binding nature, RPRs may influence consumers’ willingness to pay by setting a reference point. Loss averse consumers will then be reluctant to pay a price higher than the recommended one. Furthermore, at a given price level consumers will dema...
Tamper-proof devices are pretty powerful. They typically make security applications simpler (provided that the tamper-proof assumption is not violated). For application requiring privacy, we observe that some properties may become harder (if possible at all) to achieve when devices are maliciously used. We take the example of deniability, receiptfreeness, and anonymity. We formalize the trusted...
In recent years, internet user was grown significantly. Even though many problems arise due to abuse. The sectors affected by the is digital assets or right. Various ways are done solve violation. One of that develop protection Digital Right Management (DRM). However, DRM technology has several disadvantages such as there no way track leak and prove a copyright violation, unable authenticate co...
Security has emerged as the most feared aspect of cloud computing and a major hindrance for the customers. In existing system for establishing secure and privacy-assured service outsourcing in cloud computing which uses Linear programming and compressed sensing techniques to transform images, which aims to take security, complexity, and efficiency into consideration from the very beginning of t...
Wireless sensor networks are comprised of large numbers of resource-constrained and wirelessly communicating computing devices. Advances in computing and communication technology have made it possible to integrate sensing capabilities, wireless communication interfaces, and microprocessors into tiny devices that allow to embed compuational power in arbitrary environments. The applications of wi...
In this paper we extend the ideas for differential fault attacks on the RSA cryptosystem (see [4]) to schemes using elliptic curves. We present three different types of attacks that can be used to derive information about the secret key if bit errors can be inserted into the elliptic curve computations in a tamper-proof device. The effectiveness of the attacks was proven in a software simulatio...
As electronic commerce will increase, players will increasingly wish to have signed documents and strong encryption. According to current knowledge, it must be expected that the costs of attacking, through Trojan horses, crypto impleme ntations on computers with mainstream operating systems, are low. This threatens legal certainty, either because such Trojan horses will emerge, or because their...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید