Sciweavers

197 search results - page 11 / 40
» Is attack better than defense
Sort
View
FSE
2011
Springer
264views Cryptology» more  FSE 2011»
12 years 11 months ago
An Improved Algebraic Attack on Hamsi-256
Hamsi is one of the 14 second-stage candidates in NIST’s SHA-3 competition. The only previous attack on this hash function was a very marginal attack on its 256-bit version publi...
Itai Dinur, Adi Shamir
INFOCOM
2007
IEEE
14 years 1 months ago
Measuring Network-Aware Worm Spreading Ability
— This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent worms that exploit such a vuln...
Zesheng Chen, Chuanyi Ji
EUROCRYPT
1994
Springer
13 years 11 months ago
The Self-Shrinking Generator
The self-shrinking generator was introduced in 1994. It is based on the idea behind the shrinking generator and despite its simplicity it has remained remarkably resistant to effic...
Willi Meier, Othmar Staffelbach
MMSEC
2004
ACM
95views Multimedia» more  MMSEC 2004»
14 years 27 days ago
An improved attack analysis on a public-key spread spectrum watermarking
We analyze the fingerprinting method in [1] and suggest attacks that are better than the ones presented therein. To do this, we observe and use some extra information available i...
Mustafa Kesal, Mehmet Kivanç Mihçak,...
CCS
2005
ACM
14 years 28 days ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar