In the analysis of many cryptographic protocols, it is useful to distinguish two classes of attacks: passive attacks in which an adversary eavesdrops on messages sent between honest users and active attacks (i.e., “man-in-the-middle” attacks) in which — in addition to eavesdropping — the adversary inserts, deletes, or arbitrarily modifies messages sent from one user to another. Passive attacks are well characterized (the adversary’s choices are inherently limited) and techniques for achieving security against passive attacks are relatively well understood. Indeed, cryptographers have long focused on methods for countering passive eavesdropping attacks, and much work in the 1970’s and 1980’s has dealt with formalizing notions of security and...
The security of cryptographic implementations running on embedded systems is threatened by side-chan...
We study the design of cryptographic primitives resistant to a large class of side-channel attacks, ...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
In the analysis of many cryptographic protocols, it is useful to distinguish two classes of attacks:...
The article discusses typical types of attacks on modern cryptosystem as the way to protect all weak...
In this thesis we investigate the secure network coding problem. We are interested in both passive a...
The multiparty key exchange introduced in Steiner et al. and presented in more general form by the a...
We introduce and study a general transformation that maps a protocol secure in an extremely weak sen...
In hostile environments, adversaries can launch passive attacks against interceptable routing inform...
Abstract. On top of the passively secure extension protocol of [IKNP03] we build a new construction ...
Abstract This article deals with operational attacks leaded against cryptographic tools. Problem is ...
Historically, a computing resource is scarce and expensive. In the last few decades, considerable ef...
[[abstract]]For the dependent protocols to perform the server-aided RSA secret computation, the dama...
International audienceImplementing a secure system is much more complex than providing a theoretical...
This article discusses opportunities and challenges of physical layer security integration in massiv...
The security of cryptographic implementations running on embedded systems is threatened by side-chan...
We study the design of cryptographic primitives resistant to a large class of side-channel attacks, ...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
In the analysis of many cryptographic protocols, it is useful to distinguish two classes of attacks:...
The article discusses typical types of attacks on modern cryptosystem as the way to protect all weak...
In this thesis we investigate the secure network coding problem. We are interested in both passive a...
The multiparty key exchange introduced in Steiner et al. and presented in more general form by the a...
We introduce and study a general transformation that maps a protocol secure in an extremely weak sen...
In hostile environments, adversaries can launch passive attacks against interceptable routing inform...
Abstract. On top of the passively secure extension protocol of [IKNP03] we build a new construction ...
Abstract This article deals with operational attacks leaded against cryptographic tools. Problem is ...
Historically, a computing resource is scarce and expensive. In the last few decades, considerable ef...
[[abstract]]For the dependent protocols to perform the server-aided RSA secret computation, the dama...
International audienceImplementing a secure system is much more complex than providing a theoretical...
This article discusses opportunities and challenges of physical layer security integration in massiv...
The security of cryptographic implementations running on embedded systems is threatened by side-chan...
We study the design of cryptographic primitives resistant to a large class of side-channel attacks, ...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...