An Analysis of ZVP-Attack on ECC Cryptosystems, by Claude Crépeau and Raza Ali Kazmi
Elliptic curve cryptography (ECC) is an efficient public cryptosystem with
a short key size. For this reason it is suitable for implementing on memory-constraint
devices such as smart cards, mobile devices, etc. However, these devices leak information
about their private key through side channels (power consumption, electromagnetic
radiation, timing etc) during cryptographic processing. In this paper we have examined
countermeasures against a specific class of side channel attacks (power analysis) called
Zero-Value Point Attack (ZVP), using elliptic curve isomorphism and isogeny. We found
that these methods are an efficient way of securing cryptographic devices using ECC
against ZVP attack. Our main contribution is to extend the work of Akishita and Takagi
[3,2] to binary fields. We also provide a more detail analysis of the ZVP attack over
Homomorphic A-codes for Network Coding, by Zhaohui Tang
Authentication codes (A-codes) are a well studied technique to provide unconditionally secure
authentication. An A-code is defined by a map that associates a pair formed by a message and a key
to a tag. A-codes linear in the keys have been studied for application to distributed authentication
schemes. In this paper, we address the dual question, namely the study of A-codes that are linear in the
messages. This is usually an undesired property, except in the context of network coding. Regarding
these A-codes, we derive some lower bounds on security parameters when key space is known. We
also show a lower bound on key size when security parameter values are given (with some special
properties) and construct some codes meeting the bound.
Security and Cryptography Researcher, Safemarket Ltd, Thessaloniki, Greece
Safemarket Ltd., a software development and secure computer services company, seeks one Security or Cryptography specialist for participating on the research project entitled \"Secure Automated E-learning tests and Logic Puzzles\".
Ph.D. in Computer Science with specialization in at least one of the following (or related) areas: Networks/Servers, Computer and Network Security, Applied Cryptography, Computer Systems.
Excellent knowledge on web/application server customization
Strong understanding (server administration) of Linux OS, preferably CentOS or Ubuntu
Experience in Database Security and Cryptography Policies
Certifications: CISSP, CCSP, RHCE, CCNA, MCSA, Linux + Pro, CEH (Certified Ethical Hacker)
MySQL, PHP, Java
Web / SQL Load Balancing
Fluency in English
Game/Application Servers (Glassfish)
Proved experience in network/server management and administration
This a 3-year contract research position (full 36 months) with a salary of about 2100 Euros (gross). The project is Co-financed by the European Union and Greece - Operational Program \'Human Resources Development\' - NSFR 2007-2013 - European Social Fund.
Successful applicant will lead the security group with the role of organising/administrating the whole infrastructure required for supporting secure and fair electronic contests.
Contact: Send a cover letter and a detailed CV to: jobs (at) safemarket.gr