Sciweavers

12183 search results - page 29 / 2437
» Computers under Attacks!
Sort
View
DCC
2008
IEEE
14 years 9 months ago
Semantic security for the McEliece cryptosystem without random oracles
In this paper, we formally prove that padding the plaintext with a random bit-string provides the semantic security against chosen plaintext attack (IND-CPA) for the McEliece (and ...
Ryo Nojima, Hideki Imai, Kazukuni Kobara, Kirill M...
APSCC
2008
IEEE
14 years 4 months ago
A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures
Software systems today often run in malicious environments in which attacks or intrusions are quite common. This situation has brought security concerns into the development of so...
Yanguo Liu, Issa Traoré, Alexander M. Hoole
NDSS
2005
IEEE
14 years 3 months ago
Security Analysis and Improvements for IEEE 802.11i
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
Changhua He, John C. Mitchell
ISPEC
2010
Springer
14 years 3 months ago
On Fast and Approximate Attack Tree Computations
Abstract. In this paper we address the problem of inefficiency of exact attack tree computations. We propose several implementation-level optimizations and introduce a genetic algo...
Aivo Jürgenson, Jan Willemson
ASIACRYPT
2009
Springer
14 years 4 months ago
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
Abstract. Physical attacks on cryptographic implementations and devices have become crucial. In this context a recent line of research on a new class of side-channel attacks, calle...
Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi,...