Sciweavers

583 search results - page 38 / 117
» On the Complexity of Matsui's Attack
Sort
View
CHI
2005
ACM
14 years 7 months ago
Applying the lessons of the attack on the world trade center, 11th September 2001, to the design and use of interactive evacuati
The collapse of buildings, such as terminal 2E at Paris' Charles de Gaule Airport, and of fires, such as the Rhode Island, Station Night Club tragedy, has focused public atte...
C. W. Johnson
GLOBECOM
2008
IEEE
14 years 1 months ago
Wavelet Based Detection of Session Hijacking Attacks in Wireless Networks
— This paper develops a mechanism for detecting session hijacking attacks in wireless networks. The proposed scheme is based on detecting abrupt changes in the strength of the re...
Xiaobo Long, Biplab Sikdar
PKC
2005
Springer
89views Cryptology» more  PKC 2005»
14 years 26 days ago
A New Related Message Attack on RSA
Coppersmith, Franklin, Patarin, and Reiter show that given two RSA cryptograms xe mod N and (ax + b)e mod N for known constants a, b ∈ ZN , one can compute x in O(e log2 e) ZN -o...
Oded Yacobi, Yacov Yacobi
IWDW
2004
Springer
14 years 22 days ago
Watermarking Attack: Security of WSS Techniques
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is studied here in adopting a cryptanalysis point of view. The security is proport...
François Cayre, Caroline Fontaine, Teddy Fu...
FSE
2000
Springer
96views Cryptology» more  FSE 2000»
13 years 11 months ago
On the Interpolation Attacks on Block Ciphers
Abstract. The complexity of interpolation attacks on block ciphers depends on the degree of the polynomial approximation and or on the number of terms in the polynomial approximati...
Amr M. Youssef, Guang Gong