Sciweavers

704 search results - page 20 / 141
» A Practical Attack on KeeLoq
Sort
View
COMPSAC
2000
IEEE
14 years 2 months ago
A Practical Method for Watermarking Java Programs
Java programs distributed through Internet are now suffering from program theft. It is because Java programs can be easily decomposed into reusable class files and even decompiled...
Akito Monden, Hajimu Iida, Ken-ichi Matsumoto, Koj...
EUROCRYPT
2006
Springer
14 years 1 months ago
Cryptography in Theory and Practice: The Case of Encryption in IPsec
Abstract. This paper studies the gaps that exist between cryptography as studied in theory, as defined in standards, as implemented by software engineers, and as actually consumed ...
Kenneth G. Paterson, Arnold K. L. Yau
DFT
2007
IEEE
101views VLSI» more  DFT 2007»
14 years 4 months ago
Power Attacks Resistance of Cryptographic S-Boxes with Added Error Detection Circuits
Many side-channel attacks on implementations of cryptographic algorithms have been developed in recent years demonstrating the ease of extracting the secret key. In response, vari...
Francesco Regazzoni, Thomas Eisenbarth, Johann Gro...
EUROCRYPT
1998
Springer
14 years 1 months ago
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
For the most compelling applications of threshold cryptosystems, security against chosen ciphertext attack is a requirement. However, prior to the results presented here, there ap...
Victor Shoup, Rosario Gennaro
CRYPTO
2003
Springer
111views Cryptology» more  CRYPTO 2003»
14 years 2 months ago
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication
In this paper we present a very practical ciphertext-only cryptanalysis of GSM (Global System for Mobile communications) encrypted communication, and various active attacks on the ...
Elad Barkan, Eli Biham, Nathan Keller