Sciweavers

362 search results - page 6 / 73
» Extending the Resynchronization Attack
Sort
View
ASIACRYPT
2009
Springer
14 years 18 hour ago
PSS Is Secure against Random Fault Attacks
A fault attack consists in inducing hardware malfunctions in order to recover secrets from electronic devices. One of the most famous fault attack is Bellcore’s attack against RS...
Jean-Sébastien Coron, Avradip Mandal
ICDCSW
2011
IEEE
12 years 7 months ago
SenSec: A Scalable and Accurate Framework for Wireless Sensor Network Security Evaluation
—Developing secure wireless sensor networks (WSNs) is a complex process that involves careful design of attack test cases and security countermeasures, as well as meaningful eval...
Yi-Tao Wang, Rajive Bagrodia
SACRYPT
2000
Springer
118views Cryptology» more  SACRYPT 2000»
13 years 11 months ago
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security
We present and analyze attacks on additive stream ciphers that rely on linear equations that hold with non-trivial probability in plaintexts that are encrypted using distinct keys....
David A. McGrew, Scott R. Fluhrer
CANS
2009
Springer
164views Cryptology» more  CANS 2009»
14 years 2 months ago
Extensions of the Cube Attack Based on Low Degree Annihilators
At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an ini...
Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei We...
FAST
2009
13 years 5 months ago
WorkOut: I/O Workload Outsourcing for Boosting RAID Reconstruction Performance
User I/O intensity can significantly impact the performance of on-line RAID reconstruction due to contention for the shared disk bandwidth. Based on this observation, this paper p...
Suzhen Wu, Hong Jiang, Dan Feng, Lei Tian, Bo Mao