Sciweavers

362 search results - page 15 / 73
» Extending the Resynchronization Attack
Sort
View
CHES
2004
Springer
136views Cryptology» more  CHES 2004»
14 years 24 days ago
Attacking DSA Under a Repeated Bits Assumption
We discuss how to recover the private key for DSA style signature schemes if partial information about the ephemeral keys is revealed. The partial information we examine is of a se...
Peter J. Leadbitter, Dan Page, Nigel P. Smart
TIFS
2008
152views more  TIFS 2008»
13 years 7 months ago
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The se...
Luis Pérez-Freire, Fernando Pérez-Go...
ICIP
2002
IEEE
14 years 9 months ago
Nonadditive Gaussian watermarking and its application to wavelet-based image watermarking
This paper extends our recent game-theoretic approach [1] to design and embed watermarks in Gaussian signals in the presence of an adversary. The detector solves a binary hypothes...
Pierre Moulin, Aleksandar Ivanovic
ICC
2007
IEEE
14 years 1 months ago
Preventing ARP Attacks Using a Fuzzy-Based Stateful ARP Cache
— ARP cache poisoning is considered to be one of the easiest and dangerous attacks in local area networks. This paper proposes a solution to the ARP poisoning problem by extendin...
Zouheir Trabelsi, Wasim El-Hajj
CTRSA
2009
Springer
235views Cryptology» more  CTRSA 2009»
14 years 2 months ago
A Statistical Saturation Attack against the Block Cipher PRESENT
In this paper, we present a statistical saturation attack that combines previously introduced cryptanalysis techniques against block ciphers. As the name suggests, the attack is st...
Baudoin Collard, François-Xavier Standaert