Sciweavers

362 search results - page 14 / 73
» Extending the Resynchronization Attack
Sort
View
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
14 years 1 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
ICITA
2005
IEEE
14 years 1 months ago
Some Remarks on Security of Receipt-Free E-auction
Recently, a receipt-free scheme is rising for a secure eauction. The goal of a receipt-free scheme in an eauction is to prevent a bid-rigging. If the bid-rigging happens in the e-...
Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai
ITCC
2005
IEEE
14 years 1 months ago
AES Power Attack Based on Induced Cache Miss and Countermeasure
This paper presents a new attack against a software implementation of the Advanced Encryption Standard. The attack aims at flushing elements of the SBOX from the cache, thus indu...
Guido Bertoni, Vittorio Zaccaria, Luca Breveglieri...
FSE
2010
Springer
132views Cryptology» more  FSE 2010»
14 years 6 days ago
Rebound Attack on Reduced-Round Versions of JH
Abstract. JH, designed by Wu, is one of the 14 second round candidates in the NIST Hash Competition. This paper presents the first analysis results of JH by using rebound attack. ...
Vincent Rijmen, Deniz Toz, Kerem Varici
COMPSEC
2008
113views more  COMPSEC 2008»
13 years 7 months ago
Automated containment of rootkits attacks
Abstract-- Rootkit attacks are a serious threat to computer systems. Packaged with other malware such as worms, viruses and spyware, rootkits pose a more potent threat than ever be...
Arati Baliga, Liviu Iftode, Xiaoxin Chen