GTACS

A Greater Tel-Aviv Area Seminar

Adi Akavia: Cryptography Resilient to Memory Attacks

Cryptography Resilient to Memory Attacks

Adi Akavia, Weizmann Institute

The security of various cryptosystems in common use has been completely
compromised by "side channel attacks", namely, by attacks exploiting
leakage of information on the underlying secret keys. Such information
leakage typically emanates from physical characteristics inevitably
involved in real-world implementations of cryptographic protocols (say,
power consumption, timing, or electro-magnetic radiation).

03/03/2011 - 13:00

Danny Harnik: Security and Deduplication in the Cloud

Security and Deduplication in the Cloud

Danny Harnik, IBM Research

The talk will discuss security and privacy issues that arise from
deduplication in the cloud. Deduplication, is a popular form of compression
for large storage systems in which duplicate copies of files are replaced
by links to a single copy. This technique is also used to reduce the
bandwidth of incoming data to a storage cloud and has a significant effect
on the cost of maintaining such clouds (especially when deployed across
different users).

09/06/2011 - 13:00