Learn More
In this paper we extend the ideas for differential fault attacks on the RSA cryptosystem (see [4]) to schemes using elliptic curves. We present three different types of attacks that can be used to derive information about the secret key if bit errors can be inserted into the elliptic curve computations in a tamper-proof device. The effectiveness of the(More)
Every practical implementation of a cryptographic algorithm represents a physical device possessing potential side channels not covered by the security models of theoretical cryptography. Hence, even provable secure cryptographic algorithms may be attacked due to leakage of information. Smart cards and security ICs are often used as tamper-proof security(More)
A variety of molecules in human blood have been implicated in the inhibition of HIV-1. However, it remained elusive which circulating natural compounds are most effective in controlling viral replication in vivo. To identify natural HIV-1 inhibitors we screened a comprehensive peptide library generated from human hemofiltrate. The most potent fraction(More)
The Scalable Vector Graphics format SVG is already substantially improving graphics delivery on the web, but some important issues still remain to be addressed. In particular, SVG does not support client-side adaption of documents to different viewing conditions, such as varying screen sizes, style preferences or different device capabilities. Based on our(More)
We present an augmented reality application for mechanics education. It utilizes a recent physics engine developed for the PC gaming market to simulate physical experiments in the domain of mechanics in real time. Students are enabled to actively build own experiments and study them in a three-dimensional virtual world. A variety of tools are provided to(More)
We present a concept for the realization of asymmetric cryptographic techniques in lightweight cryptographic devices and describe an implementation based on elliptic curve cryptography which can be used for authentication in mass applications of RFID tags. Our schemes offer advantages in large decentralized applications with many unobservable readers in the(More)