Sciweavers

176 search results - page 7 / 36
» Distinguishing Attacks on T-Functions
Sort
View
ICC
2007
IEEE
133views Communications» more  ICC 2007»
14 years 2 months ago
Machine Learning for Automatic Defence Against Distributed Denial of Service Attacks
— Distributed Denial of Service attacks pose a serious threat to many businesses which rely on constant availability of their network services. Companies like Google, Yahoo and A...
Stefan Seufert, Darragh O'Brien
CRYPTO
2011
Springer
280views Cryptology» more  CRYPTO 2011»
12 years 7 months ago
A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
At CHES 2010, the new block cipher PRINTcipher was presented as a light-weight encryption solution for printable circuits [15]. The best attack to date is a differential attack [1...
Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda Al...
FSE
2000
Springer
91views Cryptology» more  FSE 2000»
13 years 11 months ago
A Statistical Attack on RC6
This paper details the attack on RC6 which was announced in a report published in the proceedings of the second AES candidate conference (March 1999). Based on an observation on th...
Henri Gilbert, Helena Handschuh, Antoine Joux, Ser...
FSE
2003
Springer
112views Cryptology» more  FSE 2003»
14 years 27 days ago
Cryptanalysis of SOBER-t32
Abstract. Sober-t32 is a candidate stream cipher in the NESSIE competition. Some new attacks are presented in this paper. A Guess and Determine attack is mounted against Sober-t32 ...
Steve Babbage, Christophe De Cannière, Jose...
CHES
2008
Springer
260views Cryptology» more  CHES 2008»
13 years 9 months ago
Mutual Information Analysis
We propose a generic information-theoretic distinguisher for differential side-channel analysis. Our model of side-channel leakage is a refinement of the one given by Standaert et ...
Benedikt Gierlichs, Lejla Batina, Pim Tuyls, Bart ...