Sciweavers

923 search results - page 95 / 185
» Improved Slide Attacks
Sort
View
ICIP
2002
IEEE
16 years 5 months ago
Robust bandlimited watermarking with trellis coded modulation
Digital watermarking is equivalent to bandlimited, powerlimited digital communication. The power limit is due to the requirement of imperceptible watermarks, and has long been rec...
Aria Nosratinia, Vimal Thilak
GLOBECOM
2007
IEEE
15 years 10 months ago
Addressing the Weakness in a Lightweight RFID Tag-Reader Mutual Authentication Scheme
— A lightweight radio frequency identification (RFID) tag-reader mutual authentication scheme was recently proposed as an improvement over the original authentication protocol s...
Tong-Lee Lim, Tieyan Li
SOUPS
2006
ACM
15 years 10 months ago
Passpet: convenient password management and phishing protection
We describe Passpet, a tool that improves both the convenience and security of website logins through a combination of techniques. Password hashing helps users manage multiple acc...
Ka-Ping Yee, Kragen Sitaker
RAID
2004
Springer
15 years 9 months ago
Formal Reasoning About Intrusion Detection Systems
We present a formal framework for the analysis of intrusion detection systems (IDS) that employ declarative rules for attack recognition, e.g. specification-based intrusion detect...
Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Ka...
CRYPTO
2008
Springer
163views Cryptology» more  CRYPTO 2008»
15 years 5 months ago
Cryptanalysis of the GOST Hash Function
In this article, we analyze the security of the GOST hash function. The GOST hash function, defined in the Russian standard GOST 34.11-94, is an iterated hash function producing a ...
Florian Mendel, Norbert Pramstaller, Christian Rec...