Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Marcel Medwed"'
Autor:
Eduardo Alvarenga, Jan R. Brands, Peter Doliwa, Jerry den Hartog, Erik Kraft, Marcel Medwed, Ventzislav Nikov, Joost Renes, Martin Rosso, Tobias Schneider, Nikita Veshchikov
Publikováno v:
IEEE Transactions on Emerging Topics in Computing. :1-16
Autor:
Marcel Medwed
Publikováno v:
Encyclopedia of Cryptography, Security and Privacy ISBN: 9783642277399
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d7a9a2c1b812e767d17a5a785db59ab0
https://doi.org/10.1007/978-3-642-27739-9_1702-1
https://doi.org/10.1007/978-3-642-27739-9_1702-1
Publikováno v:
CSR
Modern embedded IoT devices are an attractive target for cyber attacks. For example, they can be used to disable entire factories and ask for ransom. Recovery of compromised devices is not an easy task, because malware can subvert the original softwa
Autor:
Naofumi Homma, Marcel Medwed
This book constitutes the thoroughly refereed post-conference proceedings of the 14th International Conference on Smart Card Research and Advanced Applications, CARDIS 2015, held in Bochum, Germany, in November 2015. The 17 revised full papers presen
Autor:
Marcel Medwed
Publikováno v:
TrustED@CCS
Today 2.9 billion people, or 40% of the world's population are online. By 2020, at least 40 billion more devices will become smart via embedded processors. The impact of such Internet of Things (IoT) on our society will be extraordinary. It will infl
Autor:
Marcel Medwed, Naofumi Homma
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319312705
Smart Card Research and Advanced Applications
Smart Card Research and Advanced Applications
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7862bfa2a9b6908bc57738389c1928e8
https://doi.org/10.1007/978-3-319-31271-2
https://doi.org/10.1007/978-3-319-31271-2
Autor:
Sonia Belaïd, Stefan Mangard, Jörn-Marc Schmidt, François-Xavier Standaert, Stefan Tillich, Marcel Medwed, Fabrizio De Santis, Johann Heyszl
Publikováno v:
Journal of Cryptographic Engineering
Journal of Cryptographic Engineering, 2014, 4 (3), pp.15. ⟨10.1007/s13389-014-0079-5⟩
Journal of Cryptographic Engineering, Springer, 2014, 4 (3), pp.15. ⟨10.1007/s13389-014-0079-5⟩
Journal of Cryptographic Engineering, Vol. 4, no.3, p. 157-171 (2014)
Journal of Cryptographic Engineering, 2014, 4 (3), pp.15. ⟨10.1007/s13389-014-0079-5⟩
Journal of Cryptographic Engineering, Springer, 2014, 4 (3), pp.15. ⟨10.1007/s13389-014-0079-5⟩
Journal of Cryptographic Engineering, Vol. 4, no.3, p. 157-171 (2014)
International audience; Leakage-resilient cryptography aims at developing new algorithms for which physical security against side-channel attacks can be formally analyzed. Following the work of Dziembowski and Pietrzak at FOCS 2008, several symmetric
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f6f4a33a406180c3760efd3cee9269c9
https://inria.hal.science/hal-01113984
https://inria.hal.science/hal-01113984
Publikováno v:
Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note.
Publikováno v:
Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs.
Publikováno v:
Advances in Cryptology – ASIACRYPT 2012 ISBN: 9783642349607
ASIACRYPT
ASIACRYPT
Together with masking, shuffling is one of the most frequently considered solutions to improve the security of small embedded devices against side-channel attacks. In this paper, we provide a comprehensive study of this countermeasure, including impr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::302a05bb3df2259f6955b97e001de4ae
https://hdl.handle.net/2078.1/130004
https://hdl.handle.net/2078.1/130004