Sciweavers

583 search results - page 18 / 117
» On the Complexity of Matsui's Attack
Sort
View
ASIACRYPT
2006
Springer
13 years 11 months ago
Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions
In this paper, we describe generic attacks on unbalanced Feistel schemes with contracting functions. These schemes are used to construct pseudo-random permutations from kn bits to ...
Jacques Patarin, Valérie Nachef, Côme...
ICIP
2008
IEEE
14 years 9 months ago
Game-theoretic analysis of maximum-payoff multiuser collusion
Multiuser collusion is an effective attack against traitor-tracing multimedia fingerprinting, where a group of attackers collectively mount attacks to reduce their risk of being d...
H. Vicky Zhao, Wan-Yi Sabrina Lin, K. J. Ray Liu
ESORICS
2009
Springer
14 years 8 months ago
Model-Checking DoS Amplification for VoIP Session Initiation
Current techniques for the formal modeling analysis of DoS attacks do not adequately deal with amplification attacks that may target a complex distributed system as a whole rather ...
Carl A. Gunter, José Meseguer, Musab AlTurk...
FSE
2010
Springer
144views Cryptology» more  FSE 2010»
14 years 3 days ago
Pseudo-cryptanalysis of the Original Blue Midnight Wish
The hash function Blue Midnight Wish (BMW) is a candidate in the SHA-3 competition organised by the U.S. National Institute of Standards and Technology (NIST). BMW was selected fo...
Søren S. Thomsen
ACSW
2006
13 years 8 months ago
Analysis of traceback techniques
Today's Internet is extremely vulnerable to Distributed Denial of service (DDoS) attacks. There is tremendous pressure on the sites performing online business and ISP's ...
Udaya Kiran Tupakula, Vijay Varadharajan