The random oracle model: a twenty-year retrospective

N Koblitz, AJ Menezes - Designs, Codes and Cryptography, 2015 - Springer
It has been roughly two decades since the random oracle model for reductionist security
arguments was introduced and one decade since we first discussed the controversy that had …

Critical perspectives on provable security: Fifteen years of" another look" papers

N Koblitz, A Menezes - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Contents Page 1 CRITICAL PERSPECTIVES ON PROVABLE SECURITY: FIFTEEN YEARS OF
“ANOTHER LOOK” PAPERS NEAL KOBLITZ AND ALFRED MENEZES Abstract. We give an …

Efficient identity-based traceable cloud data broadcasting with outsider anonymity and simultaneous individual transmission

M Mandal, R Sarkar - Journal of Information Security and Applications, 2023 - Elsevier
In recent years, cloud data broadcasting system has attracted intensive attention due to its
universal applicability in various Internet-of-Things enabled real-life scenarios. Cloud data …

A practical second-order fault attack against a real-world pairing implementation

J Blömer, RG Da Silva, P Günther… - 2014 Workshop on …, 2014 - ieeexplore.ieee.org
Several fault attacks against pairing-based cryptography have been described theoretically
in recent years. Interestingly, none of these has been practically evaluated. We accomplish …

On instantiating pairing-based protocols with elliptic curves of embedding degree one

S Chatterjee, A Menezes… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Since the discovery of identity-based encryption schemes in 2000, bilinear pairings have
been used in the design of hundreds of cryptographic protocols. The most commonly used …

Why cryptography should not rely on physical attack complexity

J Krämer - it-Information Technology, 2017 - degruyter.com
This work presents two implementation attacks against cryptographic algorithms. Based on
these two presented attacks, this thesis shows that the assessment of physical attack …

Physical layer security improvement by constellation selection and artificial interference

D Xu, P Ren, Q Du, L Sun… - 2017 IEEE Wireless …, 2017 - ieeexplore.ieee.org
We propose a novel physical layer scheme to suppress eavesdropping. Different from the
existing schemes which are based on secrecy rate enhancement with Gaussian signal, our …

Tampering attacks in pairing-based cryptography

J Blömer, P Günther, G Liske - 2014 Workshop on Fault …, 2014 - ieeexplore.ieee.org
In the last decade pairings have become an important, and often indispensable, ingredient
in the construction of identity-based and attribute-based cryptosystems, as well as group …

A secure restricted identity-based proxy re-encryption based routing scheme for sybil attack detection in peer-to-peer networks

SS Vinayagam, V Parthasarathy - Journal of Computational …, 2018 - ingentaconnect.com
High-security provision and the protection of data flow from the attacks are more important in
many wireless network applications. Specifically, a harmful attack against a peer-to-peer …

Bacteria colony enumeration and classification for clonogenic assay

WB Chen, C Zhang - 2008 Tenth IEEE International Symposium …, 2008 - ieeexplore.ieee.org
Bacteria colony classification and enumeration is an essential step in clonogenic assay,
which is often performed manually in many clinical research laboratories. It is known to be …