Sciweavers

704 search results - page 13 / 141
» A Practical Attack on KeeLoq
Sort
View
IACR
2011
94views more  IACR 2011»
12 years 9 months ago
Practical Key-recovery For All Possible Parameters of SFLASH
In this paper we present a new practical key-recovery attack on the SFLASH signature scheme. SFLASH is a derivative of the older C∗ encryption and signature scheme that was broke...
Charles Bouillaguet, Pierre-Alain Fouque, Gilles M...
CRYPTO
2007
Springer
99views Cryptology» more  CRYPTO 2007»
14 years 3 months ago
Practical Cryptanalysis of SFLASH
In this paper, we present a practical attack on the signature scheme SFLASH proposed by Patarin, Goubin and Courtois in 2001 following a design they had introduced in 1998. The att...
Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Ja...
INDOCRYPT
2010
Springer
13 years 7 months ago
Attack on a Higher-Order Masking of the AES Based on Homographic Functions
In the recent years, Higher-order Side Channel attacks have been widely investigated. In particular, 2nd-order DPA have been improved and successfully applied to break several mask...
Emmanuel Prouff, Thomas Roche
ISPEC
2005
Springer
14 years 3 months ago
Risk Assessment of Production Networks Using Honeynets - Some Practical Experience
: Threats for today’s production networks range from fully automated worms and viruses to targeted, highly sophisticated multi-phase attacks carried out manually. In order to pro...
Stephan Riebach, Erwin P. Rathgeb, Birger Töd...
CCS
2006
ACM
14 years 1 months ago
Evading network anomaly detection systems: formal reasoning and practical techniques
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
Prahlad Fogla, Wenke Lee