Sciweavers

362 search results - page 5 / 73
» Extending the Resynchronization Attack
Sort
View
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
12 years 11 months ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...
HICSS
2003
IEEE
130views Biometrics» more  HICSS 2003»
14 years 20 days ago
Attack Recognition for System Survivability: A Low-level Approach
This paper extends and builds on previous work that presented a signature-based attack recognition technique. We present general requirements for “survivable attack recognition...
Carol Taylor, Jim Alves-Foss
ECAI
2010
Springer
13 years 8 months ago
Computation in Extended Argumentation Frameworks
Extended Argumentation Frameworks (EAFs) are a proposed formalism that develop abstract argumentation frameworks (AFs) by allowing attacks between arguments to be attacked themselv...
Paul E. Dunne, Sanjay Modgil, Trevor J. M. Bench-C...
FSE
2007
Springer
103views Cryptology» more  FSE 2007»
14 years 1 months ago
Improved Slide Attacks
Abstract. The slide attack is applicable to ciphers that can be represented as an iterative application of the same keyed permutation. The slide attack leverages simple attacks on ...
Eli Biham, Orr Dunkelman, Nathan Keller
EUROCRYPT
1990
Springer
13 years 11 months ago
A Known Plaintext Attack on Two-Key Triple Encryption
A chosen-plaintext attack on two-key triple encryption noted by Merkle and Hellman is extended to a known-plaintext attack. The known-plaintext attack has lower memory requirements...
Paul C. van Oorschot, Michael J. Wiener