Sciweavers

1085 search results - page 23 / 217
» A Timing Attack on RC5
Sort
View
PKC
2007
Springer
165views Cryptology» more  PKC 2007»
14 years 1 months ago
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA
Abstract. For RSA, May showed a deterministic polynomial time equivalence of computing d to factoring N(= pq). On the other hand, Takagi showed a variant of RSA such that the decry...
Noboru Kunihiro, Kaoru Kurosawa
MMMACNS
2005
Springer
14 years 27 days ago
Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes
This paper describes a novel approach for preventative protection from both known and previously unknown malicious software. It does not rely on screening the code for signatures ...
Douglas H. Summerville, Victor A. Skormin, Alexand...
JALC
2006
61views more  JALC 2006»
13 years 7 months ago
Random Polynomial-Time Attacks and Dolev-Yao Models
In this paper we present an extension of Dolev-Yao models for security protocols with a notion of random polynomial-time (Las Vegas) computability. First we notice that Dolev-Yao ...
Mathieu Baudet
APSCC
2007
IEEE
14 years 1 months ago
Transmission Time-Based Mechanism to Detect Wormhole Attacks
Tran Van Phuong, Ngo Trong Canh, Young-Koo Lee, Su...
FSE
2007
Springer
140views Cryptology» more  FSE 2007»
14 years 1 months ago
An Analytical Model for Time-Driven Cache Attacks
Kris Tiri, Onur Aciiçmez, Michael Neve, Fle...