The random oracle model: a twenty-year retrospective
N Koblitz, AJ Menezes - Designs, Codes and Cryptography, 2015 - Springer
It has been roughly two decades since the random oracle model for reductionist security
arguments was introduced and one decade since we first discussed the controversy that had …
arguments was introduced and one decade since we first discussed the controversy that had …
Critical perspectives on provable security: Fifteen years of" another look" papers
Contents Page 1 CRITICAL PERSPECTIVES ON PROVABLE SECURITY: FIFTEEN YEARS OF
“ANOTHER LOOK” PAPERS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We give an …
“ANOTHER LOOK” PAPERS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We give an …
Efficient identity-based traceable cloud data broadcasting with outsider anonymity and simultaneous individual transmission
In recent years, cloud data broadcasting system has attracted intensive attention due to its
universal applicability in various Internet-of-Things enabled real-life scenarios. Cloud data …
universal applicability in various Internet-of-Things enabled real-life scenarios. Cloud data …
A practical second-order fault attack against a real-world pairing implementation
J Blömer, RG Da Silva, P Günther… - 2014 Workshop on …, 2014 - ieeexplore.ieee.org
Several fault attacks against pairing-based cryptography have been described theoretically
in recent years. Interestingly, none of these has been practically evaluated. We accomplish …
in recent years. Interestingly, none of these has been practically evaluated. We accomplish …
On instantiating pairing-based protocols with elliptic curves of embedding degree one
S Chatterjee, A Menezes… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Since the discovery of identity-based encryption schemes in 2000, bilinear pairings have
been used in the design of hundreds of cryptographic protocols. The most commonly used …
been used in the design of hundreds of cryptographic protocols. The most commonly used …
Why cryptography should not rely on physical attack complexity
J Krämer - it-Information Technology, 2017 - degruyter.com
This work presents two implementation attacks against cryptographic algorithms. Based on
these two presented attacks, this thesis shows that the assessment of physical attack …
these two presented attacks, this thesis shows that the assessment of physical attack …
Physical layer security improvement by constellation selection and artificial interference
We propose a novel physical layer scheme to suppress eavesdropping. Different from the
existing schemes which are based on secrecy rate enhancement with Gaussian signal, our …
existing schemes which are based on secrecy rate enhancement with Gaussian signal, our …
Tampering attacks in pairing-based cryptography
J Blömer, P Günther, G Liske - 2014 Workshop on Fault …, 2014 - ieeexplore.ieee.org
In the last decade pairings have become an important, and often indispensable, ingredient
in the construction of identity-based and attribute-based cryptosystems, as well as group …
in the construction of identity-based and attribute-based cryptosystems, as well as group …
A secure restricted identity-based proxy re-encryption based routing scheme for sybil attack detection in peer-to-peer networks
SS Vinayagam, V Parthasarathy - Journal of Computational …, 2018 - ingentaconnect.com
High-security provision and the protection of data flow from the attacks are more important in
many wireless network applications. Specifically, a harmful attack against a peer-to-peer …
many wireless network applications. Specifically, a harmful attack against a peer-to-peer …
Bacteria colony enumeration and classification for clonogenic assay
Bacteria colony classification and enumeration is an essential step in clonogenic assay,
which is often performed manually in many clinical research laboratories. It is known to be …
which is often performed manually in many clinical research laboratories. It is known to be …