Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Dušan Klinec"'
Publikováno v:
Proceedings of the 19th International Conference on Security and Cryptography
The output of cryptographic functions, be it encryption routines or hash functions, should be statistically indistinguishable from a truly random data for an external observer. The property can be partially tested automatically using batteries of sta
Publikováno v:
Journal of Cryptology. 35
We analyze Dieharder statistical randomness tests according to accuracy and correct interpretation of their results. We used all tests, processed 8 TB of quantum-generated data, and obtained null distributions of first-level and second-level p-values
Autor:
Vashek Matyas, Dušan Klinec
Publikováno v:
IFIP Advances in Information and Communication Technology
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC)
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.338-351, ⟨10.1007/978-3-030-58201-2_23⟩
ICT Systems Security and Privacy Protection
ICT Systems Security and Privacy Protection ISBN: 9783030582005
SEC
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC)
35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.338-351, ⟨10.1007/978-3-030-58201-2_23⟩
ICT Systems Security and Privacy Protection
ICT Systems Security and Privacy Protection ISBN: 9783030582005
SEC
Part 8: Crypto Currencies; International audience; Keeping cryptocurrency spending keys safe and being able to use them when signing a transaction is a well-known problem, addressed by hardware wallets. Our work focuses on a transaction signing proce
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c36dc1520e84df2d52eb82fdad19db66
https://hal.inria.fr/hal-03440818/file/497034_1_En_23_Chapter.pdf
https://hal.inria.fr/hal-03440818/file/497034_1_En_23_Chapter.pdf
Publikováno v:
E-Business and Telecommunications ISBN: 9783030110383
ICETE (Selected Papers)
ICETE (Selected Papers)
The output of modern cryptographic primitives like pseudorandom generators and block or stream ciphers is frequently required to be indistinguishable from a truly random data. The existence of any distinguisher provides a hint about the insufficient
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5b70b589e5a0b9afaba282a0cf6660b2
https://doi.org/10.1007/978-3-030-11039-0_7
https://doi.org/10.1007/978-3-030-11039-0_7
Publikováno v:
ICETE (2)
We analyze Cheng’s 4p - 1 factorization method as the means of a potential backdoor for the RSA primes generated inside black-box devices like cryptographic smartcards. We devise three detection methods for such a backdoor and also audit 44 million
Publikováno v:
ACSAC
We measure the popularity of cryptographic libraries in large datasets of RSA public keys. We do so by improving a recently proposed method based on biases introduced by alternative implementations of prime selection in different cryptographic librar
Publikováno v:
CCS
We report on our discovery of an algorithmic flaw in the construction of primes for RSA key generation in a widely-used library of a major manufacturer of cryptographic hardware. The primes generated by the library suffer from a significant loss of e
Publikováno v:
CCS
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c9144fb88182bd7c2575577a739122de
http://arxiv.org/abs/1709.03817
http://arxiv.org/abs/1709.03817
Publikováno v:
SECRYPT
The wide range of security applications requires data either truly random or indistinguishable from the random. The statistical tests included in batteries like NIST STS or Dieharder are frequently used to assess this randomness property. We designed
Publikováno v:
Securing Cyber-Physical Systems ISBN: 9780429091049
Our chapter will summarize the experimental development of the WSNProtectLayer – an open-source middleware for security and privacy support. This middleware, we believe, will decrease development time (for developers of end applications) and decrea
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1a5753833f72f6fd7685713752d6f7ef
https://doi.org/10.1201/b19311-10
https://doi.org/10.1201/b19311-10