Sciweavers

704 search results - page 26 / 141
» A Practical Attack on KeeLoq
Sort
View
ICCCN
2007
IEEE
14 years 4 months ago
A Proactive Test Based Differentiation Technique to Mitigate Low Rate DoS Attacks
— Low rate DoS attacks are emerging threats to the TCP traffic, and the VoIP traffic in the Internet. They are hard to detect as they intelligently send attack traffic inside the...
Amey Shevtekar, Nirwan Ansari
PKC
2007
Springer
147views Cryptology» more  PKC 2007»
14 years 3 months ago
New Chosen-Ciphertext Attacks on NTRU
We present new and efficient key-recovery chosen-ciphertext attacks on NTRUencrypt. Our attacks are somewhat intermediate between chosen-ciphertext attacks on NTRUencrypt previousl...
Nicolas Gama, Phong Q. Nguyen
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
14 years 10 months ago
An Efficient Method for Random Delay Generation in Embedded Software
Random delays are a countermeasure against a range of side channel and fault attacks that is often implemented in embedded software. We propose a new method for generation of rando...
Ilya Kizhvatov, Jean-Sébastien Coron
SCN
2008
Springer
106views Communications» more  SCN 2008»
13 years 9 months ago
A bilateral remote user authentication scheme that preserves user anonymity
Smart card-based authentication is one of the most widely used and practical solutions to remote user authentication. Compared to other authentication schemes, our proposed scheme...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
CRYPTOLOGIA
2007
81views more  CRYPTOLOGIA 2007»
13 years 9 months ago
Sigaba: Cryptanalysis of the Full Keyspace
In this paper we consider an attack on the SIGABA cipher under the assumption that the largest practical keyspace is used. The attack highlights various strengths and weaknesses o...
Mark Stamp, Wing On Chan