Sciweavers

12183 search results - page 64 / 2437
» Computers under Attacks!
Sort
View
FOCS
2009
IEEE
14 years 4 months ago
Bit Encryption Is Complete
Abstract— Under CPA and CCA1 attacks, a secure bit encryption scheme can be applied bit-by-bit to construct a secure many-bit encryption scheme. The same construction fails, howe...
Steven Myers, Abhi Shelat
SSC
2007
Springer
161views Cryptology» more  SSC 2007»
14 years 4 months ago
On Attacks on Filtering Generators Using Linear Subspace Structures
Abstract. The filter generator consists of a linear feedback shift register (LFSR) and a Boolean filtering function that combines some bits from the shift register to create a ke...
Sondre Rønjom, Guang Gong, Tor Helleseth
ACSAC
2005
IEEE
14 years 3 months ago
Fault Attacks on Dual-Rail Encoded Systems
Fault induction attacks are a serious concern for designers of secure embedded systems. An ideal solution would be a generic circuit transformation that would produce circuits tha...
Jason Waddle, David Wagner
IJACT
2008
101views more  IJACT 2008»
13 years 10 months ago
Practical key-recovery attack against APOP, an MD5-based challenge-response authentication
Abstract: Hash functions are used in many cryptographic constructions under various assumptions, and the practical impact of collision attacks is often unclear. In this paper, we s...
Gaëtan Leurent
ECAI
2010
Springer
13 years 11 months ago
Computation in Extended Argumentation Frameworks
Extended Argumentation Frameworks (EAFs) are a proposed formalism that develop abstract argumentation frameworks (AFs) by allowing attacks between arguments to be attacked themselv...
Paul E. Dunne, Sanjay Modgil, Trevor J. M. Bench-C...