Ruhr-University Bochum

Displaying 1-10 of 10 results

  • White Papers // Feb 2013

    Analysis and Improvement of Lindell's UC-Secure Commitment Schemes

    In 2011, researcher proposed an efficient commitment scheme, with a non-interactive opening algorithm, in the Universal Composability (UC) framework. The researcher recently acknowledged a bug in its security analysis for the adaptive case. The authors analyze the proof of the original paper and propose a simple patch of the scheme....

    Provided By Ruhr-University Bochum

  • White Papers // Jun 2012

    Lapin: An Efficient Authentication Protocol Based on Ring-LPN

    The authors propose a new authentication protocol that is provably secure based on a ring variant of the Learning Parity with Noise (LPN) problem. The protocol follows the design principle of the LPN-based protocol from Eurocrypt'11 (Kiltz et al.), and like it, is a two round protocol secure against active...

    Provided By Ruhr-University Bochum

  • White Papers // May 2012

    SMARTPROXY: Secure Smartphone-Assisted Login on Compromised Machines

    In modern attacks, the attacker's goal often entails illegal gathering of user credentials such as passwords or browser cookies from a compromised web browser. An attacker first compromises the computer via some kind of attack, and then uses the control over the system to steal interesting data that she can...

    Provided By Ruhr-University Bochum

  • White Papers // Mar 2012

    Tracking DDoS Attacks: Insights Into the Business of Disrupting the Web

    Known for a long time, Distributed Denial-of-Service (DDoS) attacks are still prevalent today and cause harm on the Internet on a daily basis. The main mechanism behind this kind of attacks is the use of so called botnets, i.e., networks of compromised machines under the control of an attacker. There...

    Provided By Ruhr-University Bochum

  • White Papers // Feb 2012

    Eavesdropping on Satellite Telecommunication Systems

    While communication infrastructures rapidly intertwine with the people daily lives, public understanding of underlying technologies and privacy implications is often limited by their closed-source nature. Lacking the funding and resources of corporations and the intelligence community, developing and expanding this understanding are a sometimes tedious, but nonetheless important process. In...

    Provided By Ruhr-University Bochum

  • White Papers // Dec 2011

    Mastering Timing Challenges for the Design of Multi-Mode Applications on Multi-Core Real-Time Embedded Systems

    Driven by the increasing demand for computational power and by the rising applications' complexity in various embedded application domains, multi-core solutions emerge as the predominant platform for embedded real-time applications. In this context, designers have to face new challenges generated by the need to accommodate applications with complex timing behaviour,...

    Provided By Ruhr-University Bochum

  • White Papers // Apr 2011

    Deniable Encryption with Negligible Detection Probability: An Interactive Construction

    Deniable encryption, introduced in 1997 by Canetti, Dwork, Naor, and Ostrovsky, guarantees that the sender or the receiver of a secret message is able to "Fake" the message encrypted in a specific ciphertext in the presence of a coercing adversary, without the adversary detecting that he was not given the...

    Provided By Ruhr-University Bochum

  • White Papers // Apr 2011

    Collision Timing Attack when Breaking 42 AES ASIC Cores

    A collision timing attack which exploits the data-dependent timing characteristics of combinational circuits is demonstrated. The attack is based on the correlation collision attack presented at CHES 2010, and the timing attributes of combinational circuits when implementing complex functions, e.g., S-boxes, in hardware are exploited by the help of the...

    Provided By Ruhr-University Bochum

  • White Papers // Oct 2009

    Interaction and Collaboration Modes for Integrating Inspiring Information Into Technology-Enhanced Creativity Workshops

    The design of a creativity workshop which helps to develop new ideas of how to support elderly people to live in their own home for as long as possible is presented. The participants of the workshops were inspired by special stimuli based on everyday experiences with the needs and problems...

    Provided By Ruhr-University Bochum

  • White Papers // Aug 2009

    Transparent Mobile Storage Protection in Trusted Virtual Domains

    Mobile Storage Devices, such as USB flash drives, offer a flexible solution for the transport and exchange of data. Nevertheless, in order to prevent unauthorized access to sensitive data, many enterprises require strict security policies for the use of such devices with the effect of rendering their advantages rather unfruitful....

    Provided By Ruhr-University Bochum

  • White Papers // Jun 2012

    Lapin: An Efficient Authentication Protocol Based on Ring-LPN

    The authors propose a new authentication protocol that is provably secure based on a ring variant of the Learning Parity with Noise (LPN) problem. The protocol follows the design principle of the LPN-based protocol from Eurocrypt'11 (Kiltz et al.), and like it, is a two round protocol secure against active...

    Provided By Ruhr-University Bochum

  • White Papers // Apr 2011

    Collision Timing Attack when Breaking 42 AES ASIC Cores

    A collision timing attack which exploits the data-dependent timing characteristics of combinational circuits is demonstrated. The attack is based on the correlation collision attack presented at CHES 2010, and the timing attributes of combinational circuits when implementing complex functions, e.g., S-boxes, in hardware are exploited by the help of the...

    Provided By Ruhr-University Bochum

  • White Papers // Apr 2011

    Deniable Encryption with Negligible Detection Probability: An Interactive Construction

    Deniable encryption, introduced in 1997 by Canetti, Dwork, Naor, and Ostrovsky, guarantees that the sender or the receiver of a secret message is able to "Fake" the message encrypted in a specific ciphertext in the presence of a coercing adversary, without the adversary detecting that he was not given the...

    Provided By Ruhr-University Bochum

  • White Papers // Oct 2009

    Interaction and Collaboration Modes for Integrating Inspiring Information Into Technology-Enhanced Creativity Workshops

    The design of a creativity workshop which helps to develop new ideas of how to support elderly people to live in their own home for as long as possible is presented. The participants of the workshops were inspired by special stimuli based on everyday experiences with the needs and problems...

    Provided By Ruhr-University Bochum

  • White Papers // Aug 2009

    Transparent Mobile Storage Protection in Trusted Virtual Domains

    Mobile Storage Devices, such as USB flash drives, offer a flexible solution for the transport and exchange of data. Nevertheless, in order to prevent unauthorized access to sensitive data, many enterprises require strict security policies for the use of such devices with the effect of rendering their advantages rather unfruitful....

    Provided By Ruhr-University Bochum

  • White Papers // Feb 2012

    Eavesdropping on Satellite Telecommunication Systems

    While communication infrastructures rapidly intertwine with the people daily lives, public understanding of underlying technologies and privacy implications is often limited by their closed-source nature. Lacking the funding and resources of corporations and the intelligence community, developing and expanding this understanding are a sometimes tedious, but nonetheless important process. In...

    Provided By Ruhr-University Bochum

  • White Papers // May 2012

    SMARTPROXY: Secure Smartphone-Assisted Login on Compromised Machines

    In modern attacks, the attacker's goal often entails illegal gathering of user credentials such as passwords or browser cookies from a compromised web browser. An attacker first compromises the computer via some kind of attack, and then uses the control over the system to steal interesting data that she can...

    Provided By Ruhr-University Bochum

  • White Papers // Mar 2012

    Tracking DDoS Attacks: Insights Into the Business of Disrupting the Web

    Known for a long time, Distributed Denial-of-Service (DDoS) attacks are still prevalent today and cause harm on the Internet on a daily basis. The main mechanism behind this kind of attacks is the use of so called botnets, i.e., networks of compromised machines under the control of an attacker. There...

    Provided By Ruhr-University Bochum

  • White Papers // Feb 2013

    Analysis and Improvement of Lindell's UC-Secure Commitment Schemes

    In 2011, researcher proposed an efficient commitment scheme, with a non-interactive opening algorithm, in the Universal Composability (UC) framework. The researcher recently acknowledged a bug in its security analysis for the adaptive case. The authors analyze the proof of the original paper and propose a simple patch of the scheme....

    Provided By Ruhr-University Bochum

  • White Papers // Dec 2011

    Mastering Timing Challenges for the Design of Multi-Mode Applications on Multi-Core Real-Time Embedded Systems

    Driven by the increasing demand for computational power and by the rising applications' complexity in various embedded application domains, multi-core solutions emerge as the predominant platform for embedded real-time applications. In this context, designers have to face new challenges generated by the need to accommodate applications with complex timing behaviour,...

    Provided By Ruhr-University Bochum