Sciweavers

704 search results - page 25 / 141
» A Practical Attack on KeeLoq
Sort
View
ICCSA
2004
Springer
14 years 3 months ago
Practical Digital Signature Generation Using Biometrics
Abstract. It is desirable to generate a digital signature using biometrics but not practicable because of its inaccurate measuring and potential hill-climbing attacks, without usin...
Taekyoung Kwon, Jaeil Lee
WETICE
2003
IEEE
14 years 2 months ago
Practical Anonymity for the Masses with Mix-Networks
Designing mix-networks for low-latency applications that offer acceptable performance and provide good resistance against attacks without introducing too much overhead is very dif...
Marc Rennhard, Bernhard Plattner
ANTS
2006
Springer
91views Algorithms» more  ANTS 2006»
14 years 1 months ago
Practical Lattice Basis Sampling Reduction
We propose a practical sampling reduction algorithm for lattice bases based on work by Schnorr [1] as well as two even more effective generalizations. We report the empirical behav...
Johannes Buchmann, Christoph Ludwig
WWW
2009
ACM
14 years 10 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang
CTRSA
2010
Springer
152views Cryptology» more  CTRSA 2010»
14 years 1 months ago
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryp...
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar,...