Sciweavers

1369 search results - page 19 / 274
» A Practical Implementation of the Timing Attack
Sort
View
ARC
2006
Springer
85views Hardware» more  ARC 2006»
13 years 11 months ago
Time-Memory Trade-Off Attack on FPGA Platforms: UNIX Password Cracking
Abstract. This paper presents a hardware architecture for UNIX password cracking using Hellman's time-memory trade-off; it is the first hardware design for a key search machin...
Nele Mentens, Lejla Batina, Bart Preneel, Ingrid V...
ESORICS
2008
Springer
13 years 9 months ago
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
Abstract. We propose a novel approach for quantifying a system's resistance to unknown-message side-channel attacks. The approach is based on a measure of the secret informati...
Michael Backes, Boris Köpf
BROADNETS
2007
IEEE
14 years 1 months ago
Practical time synchronization for Bluetooth Scatternets
Abstract— By means of so-called Scatternets, Bluetooth provides the ability to construct robust wireless multi-hop networks. In this paper we propose a practical protocol for tim...
Matthias Ringwald, Kay Römer
ICDE
2009
IEEE
135views Database» more  ICDE 2009»
14 years 9 months ago
Forward Decay: A Practical Time Decay Model for Streaming Systems
Temporal data analysis in data warehouses and data streaming systems often uses time decay to reduce the importance of older tuples, without eliminating their influence, on the res...
Graham Cormode, Vladislav Shkapenyuk, Divesh Sriva...
RECOMB
2005
Springer
14 years 7 months ago
A Practical Approach to Significance Assessment in Alignment with Gaps
Abstract. Current numerical methods for assessing the statistical significance of local alignments with gaps are time consuming. Analytical solutions thus far have been limited to ...
Nicholas Chia, Ralf Bundschuh