This talk will illustrate how standard cryptographic techniques can be applied to real-life security products and services. This article presents in detail one of the examples given in the talk. It is intended to help the audience follow that part of our presentation. We chose as a characteristic example a little noticed yet ingenious Microsoft patent by Thomlinson and Walker. The Thomlinson-Walker system distributes encrypted patches to avoid reverse engineering by opponents (who would then be able to launch attacks on unpatched users). When the proportion of users who downloaded the encrypted patch becomes big enough, the decryption key is disclosed and all users install the patch. © 2014 Springer International Publishing.
CITATION STYLE
Abdalla, M., Chabanne, H., Ferradi, H., Jainski, J., & Naccache, D. (2014). Improving Thomlinson-Walker’s software patching scheme using standard cryptographic and statistical tools. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8434 LNCS, pp. 8–14). Springer Verlag. https://doi.org/10.1007/978-3-319-06320-1_2
Mendeley helps you to discover research relevant for your work.