Sciweavers

583 search results - page 45 / 117
» On the Complexity of Matsui's Attack
Sort
View
CORR
2008
Springer
76views Education» more  CORR 2008»
13 years 7 months ago
Constraint Complexity of Realizations of Linear Codes on Arbitrary Graphs
ABSTRACT. A graphical realization of a linear code C consists of an assignment of the coordinates of C to the vertices of a graph, along with a specification of linear state spaces...
Navin Kashyap
ARESEC
2011
76views more  ARESEC 2011»
12 years 7 months ago
A Complexity Based Forensic Analysis of the Trojan Horse Defence
—The Operational Complexity Model (OCM) has been used to derive the complexities of the five most prevalent cyber-crimes occurring in southeast Asia, namely peer-to-peer (P2P) mu...
Richard E. Overill, Jantje A. M. Silomon
SACRYPT
2007
Springer
167views Cryptology» more  SACRYPT 2007»
14 years 1 months ago
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
Abstract. At DRM 2002, Chow et al. [4] presented a method for implementing the DES block cipher such that it becomes hard to extract the embedded secret key in a white-box attack c...
Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart P...
AFRICACRYPT
2010
Springer
14 years 15 days ago
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of the SHA-3 competition. We present cryptanalytic results on 10 out of 14 rounds of ...
Praveen Gauravaram, Gaëtan Leurent, Florian M...
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 7 months ago
Performance Evaluation of DCA and SRC on a Single Bot Detection
: Malicious users try to compromise systems using new techniques. One of the recent techniques used by the attacker is to perform complex distributed attacks such as denial of serv...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith