Sciweavers

704 search results - page 11 / 141
» A Practical Attack on KeeLoq
Sort
View
PKC
2009
Springer
102views Cryptology» more  PKC 2009»
14 years 10 months ago
A Practical Key Recovery Attack on Basic TCHo
TCHo is a public key encryption scheme based on a stream cipher component, which is particular suitable for low cost devices like RFIDs. In its basic version, TCHo offers no IND-CC...
Mathias Herrmann, Gregor Leander
BCS
2008
13 years 11 months ago
Distributed Defence Against Denial of Service Attacks: A Practical View
In recent years, Denial of Service attacks have evolved into a predominant network security threat. In our previous work, we identified the necessary building blocks for an effect...
Gülay Öke, Georgios Loukas
FPL
2003
Springer
114views Hardware» more  FPL 2003»
14 years 2 months ago
Power Analysis of FPGAs: How Practical is the Attack?
Recent developments in information technologies made the secure transmission of digital data a critical design point. Large data flows have to be exchanged securely and involve en...
François-Xavier Standaert, Loïc van Ol...
SP
2009
IEEE
143views Security Privacy» more  SP 2009»
14 years 4 months ago
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors
—This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side-channel attacks on modern x86 processors. We study how mo...
Bart Coppens, Ingrid Verbauwhede, Koen De Bosscher...
WISEC
2009
ACM
14 years 4 months ago
Practical attacks against WEP and WPA
Erik Tews, Martin Beck