Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Dhooghe, Siemen"'
Autor:
Dhooghe, Siemen, Gaspoz, John
Publikováno v:
IACR Transactions on Cryptographic Hardware and Embedded Systems. :155-179
This paper provides necessary properties to algorithmically secure firstorder maskings in scalar micro-architectures. The security notions of threshold implementations are adapted following micro-processor leakage effects which are known to the liter
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IACR Transactions on Cryptographic Hardware and Embedded Systems. :113-152
Masking schemes are the most popular countermeasure to mitigate Side-Channel Analysis (SCA) attacks. Compared to software, their hardware implementations require certain considerations with respect to physical defaults, such as glitches. To counter t
Publikováno v:
Smart Card Research and Advanced Applications ISBN: 9783031253188
ispartof: pages:103-122 ispartof: SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2022 vol:13820 pages:103-122 ispartof: 21st International Conference on Smart Card Research and Advanced Applications (CARDIS) location:ENGLAND, Birmingham date:7
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d9d1bf5f9a9f8515fbd255279b4a5f3c
https://doi.org/10.1007/978-3-031-25319-5_6
https://doi.org/10.1007/978-3-031-25319-5_6
Autor:
Dhooghe, Siemen
Symmetric key cryptography has been the corner stone in defending applications against cyber attacks. Ever since the proposal of the Data Encryption Standard (DES), people were able to protect their information technology using top of the line crypto
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1131::1edf9747409089b2d6e194259cd42446
https://lirias.kuleuven.be/handle/123456789/683408
https://lirias.kuleuven.be/handle/123456789/683408
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IACR Transactions on Symmetric Cryptology, 2020(3), 1-45. Ruhruniversität Bochum
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 3 (2020)
IACR Transactions on Symmetric Cryptology; Volume 2020, Issue 3; 1-45
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 3 (2020)
IACR Transactions on Symmetric Cryptology; Volume 2020, Issue 3; 1-45
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient hardware and software implementations, a range of emerging applications using advanced cryptographic protocols such as multi-party computation and zero knowledge pr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b474689e0d4e3051e765d9b208d09eeb
https://lirias.kuleuven.be/handle/123456789/662006
https://lirias.kuleuven.be/handle/123456789/662006
Autor:
Dhooghe, Siemen, Nikova, Svetla
Publikováno v:
Cryptography & Communications; Jan2022, Vol. 14 Issue 1, p41-58, 18p
Autor:
Symeonidis, Iraklis, Aly, Abdelrahaman, Mustafa, Mustafa Asan, Mennink, Bart, Dhooghe, Siemen, Preneel, Bart
Publikováno v:
Symeonidis, I, Aly, A, Mustafa, M A, Mennink, B, Dhooghe, S & Preneel, B 2017, SePCAR: A secure and privacy-enhancing protocol for car access provision . in Computer Security – ESORICS 2017-22nd European Symposium on Research in Computer Security, Proceedings . Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10493 LNCS, Springer Nature, pp. 475-493, 22nd European Symposium on Research in Computer Security, ESORICS 2017, Oslo, Norway, 11/09/17 . https://doi.org/10.1007/978-3-319-66399-9_26
We present an efficient secure and privacy-enhancing protocol for car access provision, named SePCAR. The protocol is fully decentralised and allows users to share their cars conveniently without sacrifising their security and privacy. It provides ge
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______3818::fb6fbe9c0f3cb12c724f0a628b65794d
https://doi.org/10.1007/978-3-319-66399-9_26
https://doi.org/10.1007/978-3-319-66399-9_26