Sciweavers

583 search results - page 67 / 117
» On the Complexity of Matsui's Attack
Sort
View
EUROCRYPT
2000
Springer
14 years 2 days ago
Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R)
In a series of papers Patarin proposes new efficient public key systems. A very interesting proposal, called 2-Round Public Key System with S Boxes, or 2R, is based on the difficul...
Eli Biham
USS
2008
13 years 10 months ago
Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods
Automated bot/botnet detection is a difficult problem given the high level of attacker power. We propose a systematic approach for evaluating the evadability of detection methods....
Elizabeth Stinson, John C. Mitchell
WSC
2004
13 years 9 months ago
On Using Monte Carlo Methods for Scheduling
Monte Carlo techniques have long been used (since Buffon's experiment to approximate the value of by tossing a needle onto striped paper) to analyze phenomena which, due to ...
Samarn Chantaravarapan, Ali K. Gunal, Edward J. Wi...
ACISP
2010
Springer
13 years 6 months ago
Second-Preimage Analysis of Reduced SHA-1
Many applications using cryptographic hash functions do not require collision resistance, but some kind of preimage resistance. That's also the reason why the widely used SHA-...
Christian Rechberger
IFIP
2010
Springer
13 years 3 months ago
A Formal Analysis of Authentication in the TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security than is possible in software alone. To this end, the TPM pr...
Stéphanie Delaune, Steve Kremer, Mark Dermo...