Sciweavers

476 search results - page 22 / 96
» A New Attack against Khazad
Sort
View
AINA
2010
IEEE
14 years 2 months ago
Against Spyware Using CAPTCHA in Graphical Password Scheme
—Text-based password schemes have inherent security and usability problems, leading to the development of graphical password schemes. However, most of these alternate schemes are...
Liming Wang, Xiuling Chang, Zhongjie Ren, Haichang...
ISW
2001
Springer
14 years 2 months ago
Oblivious Image Watermarking Robust against Scaling and Geometric Distortions
Abstract. Watermarking stays the main technical safeguard of electronic copyright. This paper presents the first public-domain oblivious watermarking scheme for images which survi...
Francesc Sebé, Josep Domingo-Ferrer
ICST
2009
IEEE
13 years 7 months ago
Penetration Testing with Improved Input Vector Identification
Penetration testing is widely used to help ensure the security of web applications. It discovers vulnerabilities by simulating attacks from malicious users on a target application...
William G. J. Halfond, Shauvik Roy Choudhary, Ales...
LATINCRYPT
2010
13 years 8 months ago
Generic Attacks on Misty Schemes
Abstract. Misty schemes are classic cryptographic schemes used to construct pseudo-random permutations from 2n bits to 2n bits by using d pseudo-random permutations from n bits to ...
Valérie Nachef, Jacques Patarin, Joana Treg...
ASIACRYPT
2010
Springer
13 years 7 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir