Sciweavers

476 search results - page 14 / 96
» A New Attack against Khazad
Sort
View
ISCAS
2005
IEEE
129views Hardware» more  ISCAS 2005»
14 years 3 months ago
Cryptanalysis of a multistage encryption system
— This paper analyzes the security of a new multistage encryption system (MES) recently proposed in ISCAS’2004. It is found that MES is insecure against a differential chosenpl...
Chengqing Li, Xinxiao Li, Shujun Li, Guanrong Chen
INFOCOM
2012
IEEE
12 years 8 days ago
Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are no longer a nascent technology and today, they are actively deployed as a viable technology in many diverse application domains such as health ...
Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Y...
CCS
2009
ACM
14 years 10 months ago
A new hash family obtained by modifying the SHA-2 family
In this work, we study several properties of the SHA-2 design which have been utilized in recent collision attacks against reduced round SHA-2. Small modifications to the SHA-2 des...
Somitra Kumar Sanadhya, Palash Sarkar
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
13 years 7 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
INFOCOM
2011
IEEE
13 years 1 months ago
A dynamic game solution to malware attack
—Given the flexibility that software-based operation provides, it is unreasonable to expect that new malware will demonstrate a fixed behavior over time. Instead, malware can d...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman