Sciweavers

362 search results - page 13 / 73
» Extending the Resynchronization Attack
Sort
View
ACMSE
2005
ACM
14 years 29 days ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke
ASIACRYPT
2010
Springer
13 years 5 months ago
Rotational Rebound Attacks on Reduced Skein
Abstract. In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competitio...
Dmitry Khovratovich, Ivica Nikolic, Christian Rech...
FSE
2000
Springer
153views Cryptology» more  FSE 2000»
13 years 11 months ago
Bitslice Ciphers and Power Analysis Attacks
In this paper, we present techniques to protect bitslice block ciphers against power analysis attacks. We analyze and extend a technique proposed in [14]. We apply the technique to...
Joan Daemen, Michael Peeters, Gilles Van Assche
NETWORK
2011
13 years 2 months ago
Selective jamming/dropping insider attacks in wireless mesh networks
—Wireless mesh networks (WMNs) promise to extend high-speed wireless connectivity beyond what is possible with the current WiFi-based infrastructure. However, their unique archit...
Loukas Lazos, Marwan Krunz
SAC
2012
ACM
12 years 3 months ago
Decrypting classical cipher text using Markov chain Monte Carlo
In this paper, we present the use of Markov Chain Monte Carlo (MCMC) methods to attack the classical ciphers. We use frequency analysis as our basic tool. First we investigate the...
Jian Chen, Jeffrey S. Rosenthal