Sciweavers

1834 search results - page 198 / 367
» Public Key Cryptography
Sort
View
ACNS
2005
Springer
88views Cryptology» more  ACNS 2005»
14 years 2 months ago
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
Passwords are one of the most common cause of system break-ins, because the low entropy of passwords makes systems vulnerable to brute force guessing attacks (dictionary attacks). ...
Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwo...
CHES
2005
Springer
146views Cryptology» more  CHES 2005»
14 years 2 months ago
AES on FPGA from the Fastest to the Smallest
Two new FPGA designs for the Advanced Encryption Standard (AES) are presented. The first is believed to be the fastest, achieving 25 Gbps throughput using a Xilinx Spartan-III (XC3...
Tim Good, Mohammed Benaissa
FSE
2005
Springer
84views Cryptology» more  FSE 2005»
14 years 2 months ago
Some Attacks on the Bit-Search Generator
The bit-search generator (BSG) was proposed in 2004 and can be seen as a variant of the shrinking and self-shrinking generators. It has the advantage that it works at rate 1/3 usin...
Martin Hell, Thomas Johansson
FSE
2005
Springer
98views Cryptology» more  FSE 2005»
14 years 2 months ago
New Attacks Against Reduced-Round Versions of IDEA
In this paper, we describe a sequence of simple, yet efficient chosen-plaintext (or chosen-ciphertext) attacks against reduced-round versions of IDEA (with 2, 2.5, 3, 3.5, and 4 ro...
Pascal Junod
SPW
2005
Springer
14 years 2 months ago
Repairing the Bluetooth Pairing Protocol
Abstract. We implement and demonstrate a passive attack on the Bluetooth authentication protocol used to connect two devices to each other. Using a protocol analyzer and a brute-fo...
Frank Stajano