Practical approach to re-securing compromised wireless sensor networks. | 0 | 0.34 | 2021 |
Minerva: The curse of ECDSA nonces Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces. | 0 | 0.34 | 2020 |
JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets | 0 | 0.34 | 2020 |
Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks. | 0 | 0.34 | 2019 |
Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification. | 0 | 0.34 | 2019 |
Towards Low-level Cryptographic Primitives for JavaCards. | 0 | 0.34 | 2018 |
Adaptive Secrecy Amplification with Radio Channel Key Extraction | 0 | 0.34 | 2018 |
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components. | 4 | 0.53 | 2017 |
The Efficient Randomness Testing using Boolean Functions. | 2 | 0.40 | 2017 |
Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans. | 1 | 0.35 | 2017 |
BoolTest - The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256. | 0 | 0.34 | 2017 |
The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli. | 6 | 0.51 | 2017 |
Reconsidering Attacker Models in Ad-Hoc Networks (Transcript of Discussion). | 0 | 0.34 | 2016 |
The Million-Key Question - Investigating The Origins Of Rsa Public Keys | 4 | 0.46 | 2016 |
Reconsidering Attacker Models in Ad-Hoc Networks. | 0 | 0.34 | 2016 |
On Secrecy Amplification Protocols | 0 | 0.34 | 2015 |
Architecture Considerations for Massively Parallel Hardware Security Platform - Building a Workhorse for Cryptography as a Service. | 0 | 0.34 | 2015 |
Challenges of Fiction in Network Security - Perspective of Virtualized Environments. | 0 | 0.34 | 2015 |
A New Approach to Secrecy Amplification in Partially Compromised Networks (Invited Paper). | 2 | 0.42 | 2014 |
Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits. | 0 | 0.34 | 2013 |
On the Origin of Yet another Channel. | 0 | 0.34 | 2013 |
On the Origin of Yet another Channel (Transcript of Discussion). | 0 | 0.34 | 2013 |
Evolutionary design of message efficient secrecy amplification protocols | 2 | 0.41 | 2012 |
Two Improvements of Random Key Predistribution for Wireless Sensor Networks. | 3 | 0.44 | 2012 |
Secure Logging Of Retained Data For An Anonymity Service | 1 | 0.43 | 2009 |
Security And Robustness Of Wireless Sensor Networks | 1 | 0.48 | 2009 |
Evolutionary design of secrecy amplification protocols for wireless sensor networks | 6 | 0.53 | 2009 |
The Future of Identity in the Information Society - 4th IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers | 20 | 1.68 | 2009 |
Towards True Random Number Generation in Mobile Environments | 11 | 0.74 | 2009 |
Evolutionary Design of Attack Strategies. | 0 | 0.34 | 2009 |
Authenticated key exchange with group support for wireless sensor networks | 1 | 0.35 | 2007 |
Smart Dust Security -- Key Infection Revisited | 9 | 0.73 | 2006 |