Sciweavers

986 search results - page 82 / 198
» Protecting the Intranet Against
Sort
View
ICICS
1997
Springer
14 years 9 days ago
Stateless connections
We describe a secure transformation of stateful connections or parts of them into stateless ones by attaching the state information to the messages. Secret-key cryptography is used...
Tuomas Aura, Pekka Nikander
ICICS
1997
Springer
14 years 9 days ago
Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA
Abstract. We present new related-key attacks on the block ciphers 3WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. Differential related-key attacks allow both keys and plaintex...
John Kelsey, Bruce Schneier, David Wagner
FAST
2008
13 years 10 months ago
An Analysis of Data Corruption in the Storage Stack
An important threat to reliable storage of data is silent data corruption. In order to develop suitable protection mechanisms against data corruption, it is essential to understan...
Lakshmi N. Bairavasundaram, Garth R. Goodson, Bian...
CHES
2008
Springer
135views Cryptology» more  CHES 2008»
13 years 10 months ago
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform
At CHES 2006, a DPA countermeasure based on the Fourier Transform was published. This generic countermeasure aims at protecting from DPA any S-box calculation used in symmetric cry...
Jean-Sébastien Coron, Christophe Giraud, Em...
NETWORKING
2007
13 years 9 months ago
The TCP Minimum RTO Revisited
We re-examine the two reasons for the conservative 1-second Minimum TCP-RTO to protect against spurious timeouts: i) the OS clock granularity and ii) the Delayed ACKs. We find tha...
Ioannis Psaras, Vassilis Tsaoussidis