Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Petr Svenda"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
Side-channel attacks on elliptic curve cryptography (ECC) often assume a white-box attacker who has detailed knowledge of the implementation choices taken by the target implementation. Due to the complex and layered nature of ECC, there are many choi
Externí odkaz:
https://doaj.org/article/50af233f9fff4e3d8e7f6c7fb97be525
Autor:
Petr Svenda, Antonin Dufka, Milan Broz, Roman Lacko, Tomas Jaros, Daniel Zatovic, Josef Pospisil
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 2 (2024)
The Trusted Platform Module (TPM) is a widely deployed computer component that provides increased protection of key material during cryptographic operations, secure storage, and support for a secure boot with a remotely attestable state of the target
Externí odkaz:
https://doaj.org/article/07ce4cb0415c411d843401c0929d68d2
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 4 (2020)
We present our discovery of a group of side-channel vulnerabilities in implementations of the ECDSA signature algorithm in a widely used Atmel AT90SC FIPS 140-2 certified smartcard chip and five cryptographic libraries (libgcrypt, wolfSSL, MatrixSSL,
Externí odkaz:
https://doaj.org/article/9f475132a461455faa5bb5553140c15c
Publikováno v:
Sensors, Vol 19, Iss 22, p 5041 (2019)
Research in the area of security for Wireless Sensor Networks over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocol
Externí odkaz:
https://doaj.org/article/59f48b66b15a4b04bc5bbdcefd81ac86
Publikováno v:
Sensors, Vol 19, Iss 4, p 914 (2019)
Wireless sensor networks with a large number of cheap low-power interconnected devices bring up challenging tasks when considering the security of their communications. In our previous work, we presented two approaches for the design of dynamic proto
Externí odkaz:
https://doaj.org/article/b936e86884a744a1886fac7eb8a75ec4
Publikováno v:
Proceedings of the 19th International Conference on Security and Cryptography.
Publikováno v:
Proceedings of the 19th International Conference on Security and Cryptography.
This book constitutes the thoroughly refereed post-workshop proceedings of the 26th International Workshop on Security Protocols, held in Cambridge, UK, in March 2018. The volume consists of 17 thoroughly revised invited papers presented together wit
Autor:
Bruce Christianson, Petr Švenda, Vashek Matyas, James Malcolm, Frank Stajano, Jonathan Anderson
This book constitutes the thoroughly refereed post-workshop proceedings of the 23rd International Workshop on Security Protocols, held in Cambridge, UK, in March/April 2015. After an introduction the volume presents 18 revised papers each followed b
Autor:
Bruce Christianson, James Malcolm, Vashek Matyáš, Petr Švenda, Frank Stajano, Jonathan Anderson
This book constitutes the thoroughly refereed post-workshop proceedings of the 22nd International Workshop on Security Protocols, held in Cambridge, UK, in March 2014. After an introduction the volume presents 18 revised papers each followed by a re