In this paper, we propose a new key distribution scheme for the flexible chipset pairing. Chipset pairing is the system that smartcard outputs encrypted CW (Control Word) to the STB, and the STB decrypts an encrypted CW by using the embedded secure chip. The drawback of this chipset pairing is that one smartcard is able to use for only one specified STB since it is the system using the STB bound to a smartcard. Our proposed scheme overcomes a drawback of current chipset pairing by using CRT (Chinese Remainder Theorem). To be specific, with this scheme, one smartcard can be used for multiple STBs, not only single, and apply to current chipset pairing without great changes. ��2011 IEEE
Wireless broadcasting is an efficient way to broadcast data to a large number of users. Some commerc...
\u3cp\u3eWe introduce the forward secure signature scheme XMSS \u3csup\u3e+\u3c/sup\u3e and present ...
Small units like chip cards (smart card) have the possibility of computing, storing and protecting d...
Computing WCET in a resource-constrained device such as a smart card in a safe manner raises some di...
To provide subscription-based Digital TV (DTV) data, services providers scramble the data stream (pr...
In traditional symmetric authentication schemes for smart card, the smart card sends its card number...
Computing WCET in a resource-constrained device such as a smart card in a safe manner raises some di...
We demonstrate how 1-of-n encoded speed-independent circuits provide a good framework for constructi...
CAS(Conditional Access System) is used in Pay-TV System to prohibit unauthorized user(s) accessing t...
An existing approach based on induction and theorem proving is tailored to the verification of secur...
[[abstract]]Public Key Cryptography (PKC) is recently playing an essential role in electronic bankin...
This paper presents a scalable hardware implementation of both commonly used public key cryptosystem...
Smart cards improve the convenience and security of any transaction. They provide tamper-proof stora...
This paper presents a scalable hardware implementation of both commonly used public key cryptosystem...
International audienceBilinear pairings have been widely used in cryptographic protocols since they ...
Wireless broadcasting is an efficient way to broadcast data to a large number of users. Some commerc...
\u3cp\u3eWe introduce the forward secure signature scheme XMSS \u3csup\u3e+\u3c/sup\u3e and present ...
Small units like chip cards (smart card) have the possibility of computing, storing and protecting d...
Computing WCET in a resource-constrained device such as a smart card in a safe manner raises some di...
To provide subscription-based Digital TV (DTV) data, services providers scramble the data stream (pr...
In traditional symmetric authentication schemes for smart card, the smart card sends its card number...
Computing WCET in a resource-constrained device such as a smart card in a safe manner raises some di...
We demonstrate how 1-of-n encoded speed-independent circuits provide a good framework for constructi...
CAS(Conditional Access System) is used in Pay-TV System to prohibit unauthorized user(s) accessing t...
An existing approach based on induction and theorem proving is tailored to the verification of secur...
[[abstract]]Public Key Cryptography (PKC) is recently playing an essential role in electronic bankin...
This paper presents a scalable hardware implementation of both commonly used public key cryptosystem...
Smart cards improve the convenience and security of any transaction. They provide tamper-proof stora...
This paper presents a scalable hardware implementation of both commonly used public key cryptosystem...
International audienceBilinear pairings have been widely used in cryptographic protocols since they ...
Wireless broadcasting is an efficient way to broadcast data to a large number of users. Some commerc...
\u3cp\u3eWe introduce the forward secure signature scheme XMSS \u3csup\u3e+\u3c/sup\u3e and present ...
Small units like chip cards (smart card) have the possibility of computing, storing and protecting d...