Learn More
= 0 = 1 ?? ? ? a b a∧b = 1 a∧b = 0 ?? ? ? a b ? ? Abstract Abstract 3  The five-card trick, by Bert den Boer [Eurocrypt 89], securely computes AND using 5 cards. ?? ? ? a b a∧b = 1 a∧b = 0 Abstract 4  The five-card trick, by den Boer [Eurocrypt 89], securely computes AND using 5 cards.  This paper gives a protocol which securely computes AND using 4(More)
It is known that secure multi-party computations can be achieved using a number of black and red physical cards (with identical backs). In previous studies on such card-based cryptographic protocols, typically an ideal situation where all players are semi-honest and all cards of the same suit are indistinguishable from one another was assumed. In this(More)
— This paper proposes a spectrum analysis method to identify the frequency band that can be used to perform power analysis attacks against cryptographic modules. The proposed method conducts Differential Power Analysis (DPA) in the frequency domain instead of the time domain. The result is then used to identify the frequency bands containing information(More)
Using a random deal of cards to players and a computationally unlimited eavesdropper, all players wish to share a one-bit secret key which is information-theoretically secure from the eavesdropper. This can be done by a protocol to make several pairs of players share one-bit secret keys so that all these pairs form a tree over players. In this paper we(More)