Sciweavers

416 search results - page 32 / 84
» Fault Injection Resilience
Sort
View
CHES
2009
Springer
162views Cryptology» more  CHES 2009»
14 years 8 months ago
Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security
Elliptic Curve Cryptography implementations are known to be vulnerable to various side-channel attacks and fault injection attacks, and many countermeasures have been proposed. How...
Xu Guo, Junfeng Fan, Patrick Schaumont, Ingrid Ver...
WISTP
2007
Springer
14 years 2 months ago
A New Resilient Key Management Protocol for Wireless Sensor Networks
Wireless Sensor Networks (WSN) security is an important issue which has been investigated by researchers for few years. The most fundamental security problem in WSN is key manageme...
Chakib Bekara, Maryline Laurent-Maknavicius
ICNP
2007
IEEE
14 years 2 months ago
A Poisoning-Resilient TCP Stack
— We treat the problem of large-scale TCP poisoning: an attacker, who is able to monitor TCP packet headers in the network, can deny service to all flows traversing the monitori...
Amit Mondal, Aleksandar Kuzmanovic
MASCOTS
2003
13 years 9 months ago
SPEK: A Storage Performance Evaluation Kernel Module for Block Level Storage Systems
— This paper introduces a new benchmark tool, SPEK (Storage Performance Evaluation Kernel module), for evaluating the performance of block-level storage systems in the presence o...
Ming Zhang, Qing Yang, Xubin He
CORR
2010
Springer
88views Education» more  CORR 2010»
13 years 8 months ago
Network Codes Resilient to Jamming and Eavesdropping
Abstract--We consider the problem of communicating information over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious err...
Hongyi Yao, Danilo Silva, Sidharth Jaggi, Michael ...