Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

Effects Of Architecture On Information Leakage Of A Hardware Advanced Encryption Standard Implementation, Eric A. Koziel Sep 2012

Effects Of Architecture On Information Leakage Of A Hardware Advanced Encryption Standard Implementation, Eric A. Koziel

Theses and Dissertations

Side-channel analysis (SCA) is a threat to many modern cryptosystems. Many countermeasures exist, but are costly to implement and still do not provide complete protection against SCA. A plausible alternative is to design the cryptosystem using architectures that are known to leak little information about the cryptosystem's operations. This research uses several common primitive architectures for the Advanced Encryption Standard (AES) and assesses the susceptibility of the full AES system to side-channel attack for various primitive configurations. A combined encryption/decryption core is also evaluated to determine if variation of high-level architectures affects leakage characteristics. These different configurations are evaluated under …


An Analysis Of Error Reconciliation Protocols For Use In Quantum Key Distribution, James S. Johnson Mar 2012

An Analysis Of Error Reconciliation Protocols For Use In Quantum Key Distribution, James S. Johnson

Theses and Dissertations

Quantum Key Distribution (QKD) is a method for transmitting a cryptographic key between a sender and receiver in a theoretically unconditionally secure way. Unfortunately, the present state of technology prohibits the flawless quantum transmission required to make QKD a reality. For this reason, error reconciliation protocols have been developed which preserve security while allowing a sender and receiver to reconcile the errors in their respective keys. The most famous of these protocols is Brassard and Salvail's Cascade, which is effective, but suffers from a high communication complexity and therefore results in low throughput. Another popular option is Buttler's Winnow protocol, …


Unification Modulo Theories Of Blind Signatures, Serdar Erbatur Jan 2012

Unification Modulo Theories Of Blind Signatures, Serdar Erbatur

Legacy Theses & Dissertations (2009 - 2024)

This thesis is concerned with equational unification problems that are relevant in formal verification of cryptographic protocols which deploy blind signature schemes. Blind signatures are signature schemes that keep the content confidential and have applications in modern cryptography for electronic voting and digital cash schemes. Equational unification problems studied here originate from blind RSA signatures and El Gamal encryption.


Equational Unification : Algorithms And Complexity With Applications To Cryptographic Protocol Analysis, Andrew Marshall Jan 2012

Equational Unification : Algorithms And Complexity With Applications To Cryptographic Protocol Analysis, Andrew Marshall

Legacy Theses & Dissertations (2009 - 2024)

The techniques and tools of unification theory have long been a core component of many