Sciweavers

1085 search results - page 26 / 217
» A Timing Attack on RC5
Sort
View
CRYPTO
2010
Springer
121views Cryptology» more  CRYPTO 2010»
13 years 8 months ago
Time Space Tradeoffs for Attacks against One-Way Functions and PRGs
Anindya De, Luca Trevisan, Madhur Tulsiani
FC
2003
Springer
171views Cryptology» more  FC 2003»
14 years 19 days ago
Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)
Abstract. In this paper we describe several fault attacks on the Advanced Encryption Standard (AES). First, using optical/eddy current fault induction attacks as recently publicly ...
Johannes Blömer, Jean-Pierre Seifert
CHES
2000
Springer
114views Cryptology» more  CHES 2000»
13 years 11 months ago
Montgomery Exponentiation with no Final Subtractions: Improved Results
The Montgomery multiplication is commonly used as the core algorithm for cryptosystems based on modular arithmetic. With the advent of new classes of attacks (timing attacks, power...
Gaël Hachez, Jean-Jacques Quisquater
CRITIS
2009
13 years 5 months ago
Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection
Abstract. With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical infrastructures are exposed to a multitude of serious threats that may ...
Patrick Düssel, Christian Gehl, Pavel Laskov,...