Sciweavers

476 search results - page 20 / 96
» A New Attack against Khazad
Sort
View
DATE
2005
IEEE
115views Hardware» more  DATE 2005»
14 years 3 months ago
Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach
— A novel power attack resistant cryptosystem is presented in this paper. Security in digital computing and communication is becoming increasingly important. Design techniques th...
Shengqi Yang, Wayne Wolf, Narayanan Vijaykrishnan,...
ACMSE
2008
ACM
13 years 12 months ago
A new watermarking approach for relational data
The importance of digital watermarking for digital assets such as relational databases to preserve their copyrights is becoming more and more important as time goes by. In the pas...
Vahab Pournaghshband
IACR
2011
209views more  IACR 2011»
12 years 9 months ago
Improved Attacks on Full GOST
GOST is a well known block cipher which was developed in the Soviet Union during the 1970’s as an alternative to the US-developed DES. In spite of considerable cryptanalytic eff...
Itai Dinur, Orr Dunkelman, Adi Shamir
SAINT
2008
IEEE
14 years 4 months ago
A Sybil-Resilient Reputation Metric for P2P Applications
In this paper, we propose a reputation-based trust model for P2P applications and study it a security framework. This framework makes it easy to reason about the resilience of the...
Tien Tuan Anh Dinh, Mark Ryan
FSE
2003
Springer
112views Cryptology» more  FSE 2003»
14 years 3 months ago
Cryptanalysis of SOBER-t32
Abstract. Sober-t32 is a candidate stream cipher in the NESSIE competition. Some new attacks are presented in this paper. A Guess and Determine attack is mounted against Sober-t32 ...
Steve Babbage, Christophe De Cannière, Jose...