Sciweavers

54 search results - page 2 / 11
» Backtracking Algorithmic Complexity Attacks against a NIDS
Sort
View
SBCCI
2005
ACM
136views VLSI» more  SBCCI 2005»
14 years 1 months ago
Current mask generation: a transistor level security against DPA attacks
The physical implementation of cryptographic algorithms may leak to some attacker security information by the side channel data, as power consumption, timing, temperature or elect...
Daniel Mesquita, Jean-Denis Techer, Lionel Torres,...
STOC
2006
ACM
141views Algorithms» more  STOC 2006»
14 years 8 months ago
Zero-knowledge against quantum attacks
It is proved that several interactive proof systems are zero-knowledge against general quantum attacks. This includes the Goldreich?Micali?Wigderson classical zero-knowledge proto...
John Watrous
DASFAA
2007
IEEE
163views Database» more  DASFAA 2007»
14 years 2 months ago
Protecting Individual Information Against Inference Attacks in Data Publishing
In many data-publishing applications, the data owner needs to protect sensitive information pertaining to individuals. Meanwhile, certain information is required to be published. T...
Chen Li, Houtan Shirani-Mehr, Xiaochun Yang
SACRYPT
2007
Springer
141views Cryptology» more  SACRYPT 2007»
14 years 1 months ago
Analysis of Countermeasures Against Access Driven Cache Attacks on AES
Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models ...
Johannes Blömer, Volker Krummel
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
14 years 17 days ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu