Zobrazeno 1 - 10
of 272
pro vyhledávání: '"MbedTLS"'
Autor:
Ye, Katherine Q., Green, Matthew, Sanguansin, Naphat, Beringer, Lennart, Petcher, Adam, Appel, Andrew W.
We have formalized the functional specification of HMAC-DRBG (NIST 800-90A), and we have proved its cryptographic security--that its output is pseudorandom--using a hybrid game-based proof. We have also proved that the mbedTLS implementation (C progr
Externí odkaz:
http://arxiv.org/abs/1708.08542
Publikováno v:
In Microprocessors and Microsystems November 2019 71
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Microprocessors and Microsystems: Embedded Hardware Design (MICPRO)
Microprocessors and Microsystems: Embedded Hardware Design (MICPRO), Elsevier, 2019, 71, pp.102860-. ⟨10.1016/j.micpro.2019.102860⟩
Microprocessors and Microsystems: Embedded Hardware Design (MICPRO), Elsevier, 2019, 71, pp.102860-. ⟨10.1016/j.micpro.2019.102860⟩
Faults in software implementations target both data and instructions at different locations. Bellcore attack is a well-known fault attack that is able to break CRT-RSA. In response, cryptographic libraries such as OpenSSL are designed with protection
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f071bef2475411901a1bbc9f4ac6798b
https://hal.archives-ouvertes.fr/hal-03487204
https://hal.archives-ouvertes.fr/hal-03487204
Autor:
Matthew Green, Naphat Sanguansin, Katherine Ye, Lennart Beringer, Adam Petcher, Andrew W. Appel
We have formalized the functional specification of HMAC-DRBG (NIST 800-90A), and we have proved its cryptographic security--that its output is pseudorandom--using a hybrid game-based proof. We have also proved that the mbedTLS implementation (C progr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::41ce98e9a8e4356bdef04a8298191fd6
http://arxiv.org/abs/1708.08542
http://arxiv.org/abs/1708.08542
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Application Research of Computers / Jisuanji Yingyong Yanjiu. Nov2020, Vol. 37 Issue 11, p3411-3416. 6p.
Autor:
Georges, Krister, Jahnstedt, Per
Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration
Externí odkaz:
http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-50875
Internet of Things (IoT) devices are devices with embedded sensors or software. Their usage is becoming more prevalent. They are used for smart homes, traffic tracking, weather data and sensor networks. Often IoT devices communicate wirelessly using
Externí odkaz:
http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-300091
Publikováno v:
IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Dec 2020, Virtual Event, United States
HOST
IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Dec 2020, Virtual Event, United States
HOST
International audience; This paper introduces a new profiling attack that targets elliptic curves-based cryptographic implementations. This attack exploits leakages from the conditional swap operation used in implementations using the Montgomery Ladd
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3a9825c79f8862a07374728bcff3eaed
https://hal-cea.archives-ouvertes.fr/cea-03157323
https://hal-cea.archives-ouvertes.fr/cea-03157323