Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Michael Zohner"'
Publikováno v:
Sensors, Vol 22, Iss 15, p 5577 (2022)
Cybersecurity is a challenge in the utilization of IoT devices. One of the main security functions that we need for IoT devices is authentication. In this work, we used physical unclonable function (PUF) technology to propose a lightweight authentica
Externí odkaz:
https://doaj.org/article/db9a55b46b624f40b4e59d998b7436b4
Publikováno v:
ACM Transactions on Privacy and Security. 21:1-35
Private set intersection (PSI) allows two parties to compute the intersection of their sets without revealing any information about items that are not in the intersection. It is one of the best studied applications of secure computation and many PSI
Publikováno v:
Journal of Cryptology. 30:805-858
Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used in protocols for secure two-party and multi-party computation. As secure computation becomes more practical, the need for practical large-scale OT pr
Autor:
Thomas Schneider, Scott Shenker, Gil Segev, Michael Zohner, Gilad Asharov, Daniel Demmler, Michael Schapira
Publikováno v:
Proceedings on Privacy Enhancing Technologies
Proceedings on Privacy Enhancing Technologies, Vol 2017, Iss 3, Pp 147-167 (2017)
Proceedings on Privacy Enhancing Technologies, Vol 2017, Iss 3, Pp 147-167 (2017)
The Border Gateway Protocol (BGP) computes routes between the organizational networks that make up today’s Internet. Unfortunately, BGP suffers from deficiencies, including slow convergence, security problems, a lack of innovation, and the leakage
Autor:
Mohamed Saied Emam Mohamed, Michael Zohner, Michael Walter, Johannes Buchmann, Annelie Heuser, Stanislav Bulygin
Publikováno v:
HOST
In this paper, we present improvements of the algebraic side-channel analysis of the Advanced Encryption Standard (AES) proposed in the works of M. Renauld and F.-X. Standaert. In particular, we optimize the algebraic representation of both the AES b
Publikováno v:
NDSS
from details of underlying secure computation protocol Use only fast symmetric key crypto Code is available on GitHub: http://encrypto.de/code/ABY
Publikováno v:
Advances in Cryptology--EUROCRYPT 2015 ISBN: 9783662467992
EUROCRYPT (1)
EUROCRYPT (1)
Designing an efficient cipher was always a delicate balance between linear and non-linear operations. This goes back to the design of DES, and in fact all the way back to the seminal work of Shannon.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2ef9bc5a23d1d0447a7b43460ef070f0
https://doi.org/10.1007/978-3-662-46800-5_17
https://doi.org/10.1007/978-3-662-46800-5_17
Publikováno v:
Advances in Cryptology--EUROCRYPT 2015 ISBN: 9783662467992
EUROCRYPT (1)
EUROCRYPT (1)
Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used in protocols for secure two-party and multi-party computation. As secure computation becomes more practical, the need for practical large scale obliv
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7fce3b3a61e61db67d277f7ee6ad2518
https://doi.org/10.1007/978-3-662-46800-5_26
https://doi.org/10.1007/978-3-662-46800-5_26