Sciweavers

476 search results - page 33 / 96
» A New Attack against Khazad
Sort
View
JCIT
2010
161views more  JCIT 2010»
13 years 4 months ago
Improvement on Intrusion Detection Technology Based on Protocol Analysis and Pattern Matching
With the development of high-speed network technique and increasing volume of network traffic, traditional pattern matching method can't adapt to the new challenges to intrus...
Liang Hu, Kuo Tang, Yu Ku, Kuo Zhao
SACRYPT
1998
Springer
14 years 2 months ago
Mix-Based Electronic Payments
We introduce a new payment architecture that limits the power of an attacker while providing the honest user with privacy. Our proposed method defends against all known attacks on ...
Markus Jakobsson, David M'Raïhi
CORR
2008
Springer
85views Education» more  CORR 2008»
13 years 10 months ago
Quantifying Timing Leaks and Cost Optimisation
We develop a new notion of security against timing attacks where the attacker is able to simultaneously observe the execution time of a program and the probability of the values of...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
IJNSEC
2006
131views more  IJNSEC 2006»
13 years 10 months ago
A Frobenius Map Approach for an Efficient and Secure Multiplication on Koblitz
The most efficient technique for protecting the using Frobenius algorithms for scalar multiplication on Koblitz curves against the Side Channel Attacks seems to be the multiplier ...
Mustapha Hedabou
FSE
2003
Springer
112views Cryptology» more  FSE 2003»
14 years 3 months ago
Practical Symmetric On-Line Encryption
Abstract. This paper addresses the security of symmetric cryptosystems in the blockwise adversarial model. At Crypto 2002, Joux, Martinet and Valette have proposed a new kind of at...
Pierre-Alain Fouque, Gwenaëlle Martinet, Guil...