Sciweavers

476 search results - page 15 / 96
» A New Attack against Khazad
Sort
View
INFOCOM
2005
IEEE
14 years 3 months ago
Defending against Internet worms: a signature-based approach
Abstract— With the capability of infecting hundreds of thousands of hosts, worms represent a major threat to the Internet. The defense against Internet worms is largely an open p...
Yong Tang, Shigang Chen
ICISC
2008
146views Cryptology» more  ICISC 2008»
13 years 11 months ago
A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent
Abstract. In this paper, we present a new technique for Matsui's algorithm 2 using multidimensional linear approximation. We show that the data complexity of the attack can be...
Joo Yeon Cho, Miia Hermelin, Kaisa Nyberg
ICB
2007
Springer
117views Biometrics» more  ICB 2007»
14 years 4 months ago
Wolf Attack Probability: A New Security Measure in Biometric Authentication Systems
This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a...
Masashi Une, Akira Otsuka, Hideki Imai
FDTC
2006
Springer
106views Cryptology» more  FDTC 2006»
14 years 1 months ago
Sign Change Fault Attacks on Elliptic Curve Cryptosystems
We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Change Attacks. These attacks exploit different number representations as they are often emplo...
Johannes Blömer, Martin Otto 0002, Jean-Pierr...
FC
2005
Springer
94views Cryptology» more  FC 2005»
14 years 3 months ago
Modeling and Preventing Phishing Attacks
We introduce tools to model and describe phishing attacks, allowing a visualization and quantification of the threat on a given complex system of web services. We use our new mod...
Markus Jakobsson