Sciweavers

986 search results - page 72 / 198
» Protecting the Intranet Against
Sort
View
SACRYPT
2004
Springer
136views Cryptology» more  SACRYPT 2004»
14 years 2 months ago
Cryptanalysis of a White Box AES Implementation
The white box attack context as described in [1, 2] is the common setting where cryptographic software is executed in an untrusted environment—i.e. an attacker has gained access ...
Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi
WETICE
2003
IEEE
14 years 2 months ago
A Network Worm Vaccine Architecture
The ability of worms to spread at rates that effectively preclude human-directed reaction has elevated them to a first-class security threat to distributed systems. We present th...
Stelios Sidiroglou, Angelos D. Keromytis
ICMCS
1999
IEEE
165views Multimedia» more  ICMCS 1999»
14 years 1 months ago
Template Based Recovery of Fourier-Based Watermarks Using Log-Polar and Log-Log Maps
Digital watermarks have been proposed as a method for discouraging illicit copying and distribution of copyrighted material. This paper describes a method for the secure and robus...
Shelby Pereira, Joseph Ó Ruanaidh, Fr&eacut...
FC
1998
Springer
164views Cryptology» more  FC 1998»
14 years 1 months ago
Robustness and Security of Digital Watermarks
Digital watermarking is a nascent but promising technology that offers protection of unencrypted digital content. This paper is a brief technical survey of the multimedia watermark...
Lesley R. Matheson, Stephen G. Mitchell, Talal Sha...
FDTC
2006
Springer
106views Cryptology» more  FDTC 2006»
14 years 27 days ago
Sign Change Fault Attacks on Elliptic Curve Cryptosystems
We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Change Attacks. These attacks exploit different number representations as they are often emplo...
Johannes Blömer, Martin Otto 0002, Jean-Pierr...