Filters








667 Hits in 3.9 sec

Non-black-box Techniques in Cryptography [chapter]

Boaz Barak
2006 Lecture Notes in Computer Science  
That is, we show that in several contexts in cryptography, there is a difference between the power of black-box and non-black-box techniques.  ...  In this thesis, we consider several settings in cryptography, and ask whether there actually is an advantage in using non-black-box techniques over black-box techniques in these settings.  ...  Oded, more than any other person, was instrumental in this evolution.  ... 
doi:10.1007/11753728_1 fatcat:fjwypttg2zdg3e466qcy6b6b54

Black-Box Constructions of Protocols for Secure Computation

Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Erez Petrank
2011 SIAM journal on computing (Print)  
The vast majority of constructions in cryptography are of this black-box type. 2.  ...  A rich and fruitful body of work, initiated in [22] , attempts to draw the borders between possibility and impossibility for black-box constructions in cryptography.  ...  " primitive in a black-box way.  ... 
doi:10.1137/100790537 fatcat:4vldge3jxzetlkytzfqhyvzslq

White-Box Security Notions for Symmetric Encryption Schemes [chapter]

Cécile Delerablée, Tancrède Lepoint, Pascal Paillier, Matthieu Rivain
2014 Lecture Notes in Computer Science  
White-box cryptography has attracted a growing interest from researchers in the last decade.  ...  This might be in part because it is still quite unclear what white-box cryptography really aims to achieve and which security properties are expected from white-box programs in applications.  ...  While these advances describe a generic model to translate a given notion from the black-box to the white-box setting, our aim in this paper is to define explicit security notions that white-box cryptography  ... 
doi:10.1007/978-3-662-43414-7_13 fatcat:rv6w5ogxabetln6tt3rlrzopwm

Practical Yet Composably Secure Cryptographic Protocols (Dagstuhl Seminar 19042)

Jan Camenisch, Ralf Küsters, Anna Lysyanskaya, Alessandra Scafuro, Michael Wagner
2019 Dagstuhl Reports  
This report documents the program and the outcomes of Dagstuhl Seminar 19042 "Practical Yet Composably Secure Cryptographic Protocols".  ...  security protocols in such a model; (3) how to prove security of protocols in such a model.  ...  Using known techniques, a similar result cannot be achieved given only black-box access to the functions realized by the protocols.  ... 
doi:10.4230/dagrep.9.1.88 dblp:journals/dagstuhl-reports/CamenischKLS19 fatcat:j2dfgtcoxnbvtgpu7mtxdehequ

On the Relationships Between Notions of Simulation-Based Security [chapter]

Anupam Datta, Ralf Küsters, John C. Mitchell, Ajith Ramanathan
2005 Lecture Notes in Computer Science  
Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof.  ...  However, determining whether two relations are in fact identical depends on some subtle features that have not been brought out in previous studies.  ...  composability) and WBB (weak black box simulatability).  ... 
doi:10.1007/978-3-540-30576-7_26 fatcat:p6npj22b5bdedoyx4p7p6om5je

On the Relationships between Notions of Simulation-Based Security

Ralf Küsters, Anupam Datta, John C. Mitchell, Ajith Ramanathan
2008 Journal of Cryptology  
Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof.  ...  However, determining whether two relations are in fact identical depends on some subtle features that have not been brought out in previous studies.  ...  composability) and WBB (weak black box simulatability).  ... 
doi:10.1007/s00145-008-9019-9 fatcat:5t7jlt43rjfrpgzhm7m5hkvebm

Linicrypt: A Model for Practical Cryptography [chapter]

Brent Carmer, Mike Rosulek
2016 Lecture Notes in Computer Science  
, in the random oracle model).  ...  In other words, it is possible to use a SAT/SMT solver to automatically generate Linicrypt programs satisfying a given security constraint.  ...  a black-box way.  ... 
doi:10.1007/978-3-662-53015-3_15 fatcat:d4e5qcu7evc4dbm2vnetfj2tea

Fundamentals of Multimedia Encryption Techniques [chapter]

Ahmet Eskicioglu, Daniel Socek, Borko Furht
2004 Internet and Communications  
Chosen-ciphertext attack : Here, an adversary can feed the chosen ciphertext into the black box that contains the decryption algorithm and the decryption key.  ...  Chosen-plaintext attack : Essentially, an adversary can feed the chosen plaintext into the black box that contains the encryption algorithm and the encryption key.  ... 
doi:10.1201/9781420038262.pt2 fatcat:2rqtmiz6hfgbnc5xmmtkpmltau

A High-Performance Flexible Architecture for Cryptography [chapter]

R. Reed Taylor, Seth Copen Goldstein
1999 Lecture Notes in Computer Science  
Cryptographic algorithms are more efficiently implemented in custom hardware than in software running on general-purpose processors.  ...  However, systems which use hardware implementations have significant drawbacks: they are unable to respond to flaws discovered in the implemented algorithm or to changes in standards.  ...  cryptography are bitwise shifts and rotations.  ... 
doi:10.1007/3-540-48059-5_20 fatcat:met5pdzxcjbtpjuk6wgczjfwvq

Fundamentals of Multimedia Encryption Techniques [chapter]

Borko Furht, Daniel Socek, Ahmet Eskicioglu
2006 Multimedia Encryption and Authentication Techniques and Applications  
Chosen-ciphertext attack : Here, an adversary can feed the chosen ciphertext into the black box that contains the decryption algorithm and the decryption key.  ...  Chosen-plaintext attack : Essentially, an adversary can feed the chosen plaintext into the black box that contains the encryption algorithm and the encryption key.  ... 
doi:10.1201/9781420013450.ch3 fatcat:nsorx5x2w5fmregu2cblj6jb5a

A Survey on Privacy Frameworks for RFID Authentication

Chunhua SU, Yingjiu LI, Yunlei ZHAO, Robert H. DENG, Yiming ZHAO, Jianying ZHOU
2012 IEICE transactions on information and systems  
in RFID system.  ...  We mainly divide the existing models into three categories, the four-oracle framework, eight-oracle framework and Universal Composability framework.  ...  Canonically, there are 2 or 3 rounds message exchanged as shown in Fig. 1 : Normally, we assume that in the RFID system, the reader is secure; in other words, the legitimate reader is a "black-box" to  ... 
doi:10.1587/transinf.e95.d.2 fatcat:2xaza2xudzcenjkptqqtsmph5i

Towards a maturity model for crypto-agility assessment [article]

Julian Hohm and Andreas Heinemann and Alexander Wiesmaier
2022 arXiv   pre-print
This work serves to promote CAMM and encourage others to apply it in practice and develop it jointly.  ...  Black boxes cannot be evaluated. System property Description The system can be extended with new cryptographic algorithms and parameters.  ...  R14: Cryptography inventory (K). A cryptography inventory is the documentation of the cryptography used in a system.  ... 
arXiv:2202.07645v2 fatcat:klxt7fusv5fszlz6cjrnt2uqty

Wireless Sensor Network Security Analysis

Hemanta Kumar Kalita
2021 Zenodo  
These networks are likely to be composed of hundreds, and potentially thousands of tiny sensor nodes, functioning autonomously, and in many cases, without access to renewable energy resources.  ...  While the set of challenges in sensor networks are diverse, we focus on security of Wireless Sensor Network in this paper. We propose some of the security goal for Wireless Sensor Network.  ...  Stuffing the ballot box of a voting scheme, for example. Attack 3.1 DoS/Physical Layer/Jamming. Jamming.  ... 
doi:10.5281/zenodo.5059911 fatcat:yrcshiws4vcj3deh7qcel3ai7i

Security in wireless sensor networks for health monitoring helmet with anomaly detection using power analysis and probabilistic model

Biswajit Panja, Zachary Scott, Priyanka Meharia
2014 2014 IEEE Conference on Wireless Sensors (ICWiSE)  
This system offers many advantages over conventional cryptography as it is a lightweight approach that costs few resources; individual helmet sensors need only send simple power reports to a central base  ...  This is followed by a security analysis that compares the approach to several other approaches found in the literature, and finally a conclusion.  ...  Actual data of proper and improper behavior is then contained in separate arrays of points. The current point that is to be analyzed is stored in this class as well.  ... 
doi:10.1109/icwise.2014.7042664 fatcat:ghspx6p33rg7lh6rzpx2hpyh74

A survey on adversarial attacks and defences

Anirban Chakraborty, Manaar Alam, Vishal Dey, Anupam Chattopadhyay, Debdeep Mukhopadhyay
2021 CAAI Transactions on Intelligence Technology  
As a consequence, deep learning is being extensively used in most of the recent day-to-day applications.  ...  However, there are only a few strong countermeasures which can be used in all types of attack scenarios to design a robust deep learning system.  ...  We would also like to acknowledge the Haldia Petrochemicals Ltd. and TCG Foundation for the research grant entitled Cyber Security Research in CPS.  ... 
doi:10.1049/cit2.12028 fatcat:iedjaoomardbpchx2ffhcc7zjq
« Previous Showing results 1 — 15 out of 667 results