Sciweavers

704 search results - page 28 / 141
» A Practical Attack on KeeLoq
Sort
View
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
14 years 4 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
DSN
2009
IEEE
14 years 4 months ago
Exception triggered DoS attacks on wireless networks
Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through exp...
Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Ha...
CRYPTO
2007
Springer
143views Cryptology» more  CRYPTO 2007»
14 years 3 months ago
A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU
To date the NTRUEncrypt security parameters have been based on the existence of two types of attack: a meet-in-the-middle attack due to Odlyzko, and a conservative extrapolation of...
Nick Howgrave-Graham
ISCIS
2004
Springer
14 years 3 months ago
Relay Attacks on Bluetooth Authentication and Solutions
We describe relay attacks on Bluetooth authentication protocol. The aim of these attacks is impersonation. The attacker does not need to guess or obtain a common secret known to bo...
Albert Levi, Erhan Çetintas, Murat Aydos, &...
CHES
2003
Springer
100views Cryptology» more  CHES 2003»
14 years 2 months ago
Multi-channel Attacks
We introduce multi-channel attacks, i.e., side-channel attacks which utilize multiple side-channels such as power and EM simultaneously. We propose an adversarial model which combi...
Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi