Filters








1,114 Hits in 4.6 sec

Limits on the Power of Cryptographic Cheap Talk [chapter]

Pavel Hubáček, Jesper Buus Nielsen, Alon Rosen
2013 Lecture Notes in Computer Science  
some "intermediate" utility profiles whose implementation is equivalent to the existence of one-way functions.  ...  We revisit the question of whether cryptographic protocols can replace correlated equilibria mediators in two-player strategic games.  ...  The authors would like to thank for discussions and useful comments to Ronen Gradwohl, Jonathan Katz, Noam Livne, Peter Bro Miltersen, and Margarita Vald.  ... 
doi:10.1007/978-3-642-40041-4_16 fatcat:pgb7tnsx5rgetogzcmrrg6dw44

Cryptographically Blinded Games: Leveraging Players' Limitations for Equilibria and Profit [article]

Pavel Hubáček, Sunoo Park
2014 arXiv   pre-print
In our cheap talk phase, the players execute a secure multi-party computation protocol to sample an action profile from an equilibrium of a "cryptographically blinded" version of the original game, in  ...  Our implementation makes use of a (standard) pre-play "cheap talk" phase, in which players engage in free and non-binding communication prior to playing in the original game.  ...  We are grateful to Alessandra Scafuro for raising the question of encrypting advice, to Silvio Micali for very helpful advice on exposition, and to Jesper Buus  ... 
arXiv:1411.3747v1 fatcat:r25szcyphjb5bimegode4jdg2u

Cryptographically blinded games

Pavel Hubáček, Sunoo Park
2014 Proceedings of the fifteenth ACM conference on Economics and computation - EC '14  
In our cheap talk phase, the players execute a secure multi-party computation protocol to sample an action profile from an equilibrium of a "cryptographically blinded" version of the original game, in  ...  Our implementation makes use of a (standard) pre-play "cheap talk" phase, in which players engage in free and non-binding communication prior to playing in the original game.  ...  We are grateful to Alessandra Scafuro for raising the question of encrypting advice, to Silvio Micali for very helpful advice on exposition, and to Jesper Buus  ... 
doi:10.1145/2600057.2602903 dblp:conf/sigecom/HubacekP14 fatcat:zpxgp64g75fllluf5aw4pkctyi

Theory of Implementation Security Workshop (TIs 2016)

Begul Bilgin, Svetla Nikova, Vincent Rijmen
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
This workshop is dedicated to research on the design of cryptographic algorithms and implementations secure against physical attacks.  ...  Due to the design nature of IoT systems, IoT devices are easily accessible by attackers which increases the importance of their security against physical attacks.  ...  The workshop topics include (but are not limited to) the following: • Physical attacks and countermeasures • Efficient and secure implementations of cryptographic algorithms • Designs of cryptographic  ... 
doi:10.1145/2976749.2990488 dblp:conf/ccs/BilginNR16 fatcat:5vavfnn2tre6lpicrlg4yoalwa

On Non-uniformity in Threshold Sharings

Joan Daemen
2016 Proceedings of the 2016 ACM Workshop on Theory of Implementation Security - TIS'16  
In my talk I discuss the local and global effects of nonuniformity in iterated functions and their significance on the resistance against DPA.  ...  I treat methods to quantitatively limit the amount of non-uniformity and to keep it away from where it may be harmful.  ... 
doi:10.1145/2996366.2996374 dblp:conf/ccs/Daemen16 fatcat:a2i7yd2korhcxb4oupwo4db4la

Blockchain Security at Scale (Dagstuhl Seminar 18461)

Rainer Böhme, Joseph Bonneau, Ittay Eyal, Michael Wagner
2019 Dagstuhl Reports  
The seminar was split into eight blocks of two presentations each. The mode for each talk was 15 minutes of blackboard-only presentation followed by 30 minutes of discussion.  ...  Discussions not fitting into this limit were resumed in smaller break-out groups. This report documents the scheduled talks as well as the improvised sessions for in-depth discussion.  ...  The scarcity of the consumed resource implies a rate limit on participation. On the other hand, there are proof-of-stake schemes where the ownership of a resource is demonstrated instead.  ... 
doi:10.4230/dagrep.8.11.21 dblp:journals/dagstuhl-reports/BohmeBE18 fatcat:qimnzmbgarhi7e2ssri7rjuhk4

AMPC: A Lightweight Hybrid Cryptographic Algorithm for Wireless Sensor Networks

Md. Navid Bin Anwar, Maherin Mizan Maha
2020 International Journal of Innovative Science and Research Technology  
Wireless sensor networks are commonly used in a lot of applications and are expected to have a cheap deployment cost. The network of sensors continues to grow aiding the need of the system.  ...  As WSN has limited energy source, therefore, complex cryptographic algorithms may require excessive computational time which not only make the data transmission slow but the life time of sensor network  ...  Different cryptography procedures are talked about, for example, symmetric key and open key, which further contains different cryptographic methods.  ... 
doi:10.38124/ijisrt20jun975 fatcat:sb5utivnvvhaxehjo6zeuna5ee

Why does cryptographic software fail?

David Lazar, Haogang Chen, Xi Wang, Nickolai Zeldovich
2014 Proceedings of 5th Asia-Pacific Workshop on Systems - APSys '14  
The results show that just 17% of the bugs are in cryptographic libraries (which often have devastating consequences), and the remaining 83% are misuses of cryptographic libraries by individual applications  ...  This paper presents a systematic study of cryptographic vulnerabilities in practice, an examination of state-of-the-art techniques to prevent such vulnerabilities, and a discussion of open problems and  ...  This work was supported by the DARPA Clean-slate design of Resilient, Adaptive, Secure Hosts (CRASH) program under contract #N66001-10-2-4089, and by NSF award CNS-1053143.  ... 
doi:10.1145/2637166.2637237 dblp:conf/apsys/LazarCWZ14 fatcat:upwjoelmfbhxnketl7jjazgiwe

Preservation of Digital Images: Question of Fixity

Alexey Tikhonov
2019 Heritage  
some of the limitations of current approaches, as well as discuss some non-technical implications of the described problems.  ...  The most commonly used fixity maintaining techniques are immutability of data and file checksums/cryptographic hashes.  ...  Conflicts of Interest: The author declares no conflict of interest.  ... 
doi:10.3390/heritage2020075 fatcat:anvwa5qkznfupcaivcjik7xcwm

Smart Card Security [chapter]

2010 Smart Card Handbook  
-Limited control and visibility of input and output of cryptographic algorithms.  ...  on the smartcard industry because they were relatively cheap to perform and offered a high chance of success.  ...  Marc Witteman was awarded his MSc degree in Electrical Engineering from the Delft University of Technology in the Netherlands. In 1989 he joined KPN where he initially worked on GSM development.  ... 
doi:10.1002/9780470660911.ch16 fatcat:rl53pku6srgxrmkli54leixjje

IoT Applications on Secure Smart System

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
For instance, in a market or stores, all things can be associated with one another, framing a brilliant shopping framework In such system (Internet of Things) IoT framework, a cheap RFID label can be connected  ...  The Internet of Things is altering social lives by associating regular items together.  ...  ACKNOWLEDGMENT First of all I wish to express my gratitude and thank to my project guide Prof. V. V.  ... 
doi:10.35940/ijitee.d1154.029420 fatcat:xbl25lkipbfezcxeykw55fsxnm

A Wireless Covert Channel on Smart Cards (Short Paper) [chapter]

Geir Olav Dyrkolbotn, Einar Snekkenes
2006 Lecture Notes in Computer Science  
Security features against side-channel attacks will limit the range but not prevent the attack.  ...  Experiments on modern smart cards confirm that an insider with the opportunity to hide subversive code can potentially broadcast the card's internal secrets to a nearby receiver.  ...  We would like to thank Arne Wold, at Gjovik University College, for helpful discussion and guidance related to the analysis of the results.  ... 
doi:10.1007/11935308_18 fatcat:jylo4cuxirhzrckl6auo3vdnda

Wireless user interface components for personal area networks

K.P. Fishkin, K. Partidge, S. Chatterjee
2002 IEEE pervasive computing  
However, it can have a significant effect on the range of PAN designs.  ...  The recent emergence of cheap, lowpower hardware and viable wireless transceivers lets us remove these constraints.  ...  ACKNOWLEDGMENTS We thank Jason Hill for supporting University of California at Berkeley's dot motes and Gaetano Borriello for his continuing support and counsel.  ... 
doi:10.1109/mprv.2002.1158278 fatcat:27su6p6qyvb23c4nhpjn4whsny

Security of Wireless Communication [chapter]

Dan Cvrček
2009 IFIP Advances in Information and Communication Technology  
The least, several companies managing large civil structures in the UK are keen on investigating the potential of wireless sensor networks.  ...  It seems that monitoring of large civil engineering structures is one of the few applications where wireless sensor networks may give enough value for the necessary investment.  ...  (Attackers usually do not feel to be bound by limits imposed on transmission power by regulators.)  ... 
doi:10.1007/978-3-642-03315-5_9 fatcat:26fntrqq5bfqjjugauogi4rf3q

Hardware Encapsulation of Security Services [chapter]

Adrian Baldwin, Simon Shiu
2003 Lecture Notes in Computer Science  
Such hardware secured services provide a functional root of trust that can be placed within context of a wider IT solution hence enabling strong separations of control and duty.  ...  This trust domain is defined by the hardware protection regime, the service code and the policies under which it is managed.  ...  It is believed that this is not a necessity and as processor power grows and memory remains, relatively cheap it is possible to build secure hardware devices with the power to execute authorisation and  ... 
doi:10.1007/978-3-540-39650-5_12 fatcat:dmnrzdafzbf6bgk3lmpcj5bfuy
« Previous Showing results 1 — 15 out of 1,114 results