Skip to main content

and
  1. No Access

    Chapter

    Cryptographic Attack Metrics

    When evaluating systems containing cryptographic components, the question arises how to measure the security provided by the cryptography included in the system. In this chapter we highlight the difficulties i...

    Zinaida Benenson, Ulrich Kühn, Stefan Lucks in Dependability Metrics (2008)

  2. Chapter and Conference Paper

    Secure Data Management in Trusted Computing

    In this paper we identify shortcomings of the TCG specification related to the availability of sealed data during software and hardware life cycles, i.e., software update or/and hardware migration. In our view...

    Ulrich Kühn, Klaus Kursawe, Stefan Lucks in Cryptographic Hardware and Embedded System… (2005)

  3. Chapter and Conference Paper

    A Failure-Friendly Design Principle for Hash Functions

    This paper reconsiders the established Merkle-Damgård design principle for iterated hash functions. The internal state size w of an iterated n-bit hash function is treated as a security parameter of its own right...

    Stefan Lucks in Advances in Cryptology - ASIACRYPT 2005 (2005)

  4. Chapter and Conference Paper

    A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order

    The Cramer-Shoup cryptosystem for groups of prime order is a practical public-key cryptosystem, provably secure in the standard model under standard assumptions. This paper extends the cryptosystem for groups ...

    Stefan Lucks in Advances in Cryptology — ASIACRYPT 2002 (2002)

  5. Chapter and Conference Paper

    Analysis of the E 0 Encryption System

    The encryption system E 0 , which is the encryption system used in the Bluetooth specification, is examined. In the current paper, a method of deriving t...

    Scott Fluhrer, Stefan Lucks in Selected Areas in Cryptography (2001)

  6. No Access

    Chapter and Conference Paper

    Security on Your Hand: Secure Filesystems with a “Non-cryptographic” JAVA-Ring

    In this paper we present the first implementation of highspeed filesystem encryption with a slow JAVA card. Using new “Remotely Keyed Protocols” designed by Lucks and Weis we can use the highly tamper-resistan...

    Rüdiger Weis, Bastiaan Bakker, Stefan Lucks in Java on Smart Cards:Programming and Security (2001)

  7. Chapter and Conference Paper

    The Sum of PRPs Is a Secure PRF

    Given d independent pseudorandom permutations (PRPs) π i, ..., π d over 0, 1n, it appears natural to define a pseudorandom function (PRF) by add...

    Stefan Lucks in Advances in Cryptology — EUROCRYPT 2000 (2000)

  8. No Access

    Chapter and Conference Paper

    The Performance of Modern Block Ciphers in JAVA

    This paper explores the question of how fast modern block ciphers can be realized as machine-independent Java implementations. The ciphers we considered include well-known proven ones such as DES and IDEA and ...

    Rüdiger Weis, Stefan Lucks in Smart Card Research and Applications (2000)