Sciweavers

515 search results - page 54 / 103
» Secure Parameters for SWIFFT
Sort
View
COMCOM
2008
135views more  COMCOM 2008»
13 years 8 months ago
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Active worms continue to pose major threats to the security of today's Internet. This is due to the ability of active worms to automatically propagate themselves and compromi...
Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan
JUCS
2010
124views more  JUCS 2010»
13 years 7 months ago
Performance Optimizations for DAA Signatures on Java enabled Platforms
: With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the c...
Kurt Dietrich, Franz Röck
PKC
2011
Springer
169views Cryptology» more  PKC 2011»
12 years 12 months ago
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005
At TCC 2005, Groth underlined the usefulness of working in small RSA subgroups of hidden order. In assessing the security of the relevant hard problems, however, the best attack co...
Jean-Sébastien Coron, Antoine Joux, Avradip...
INFOCOM
2005
IEEE
14 years 2 months ago
The effect of DNS delays on worm propagation in an IPv6 Internet
— It is a commonly held belief that IPv6 provides greater security against random-scanning worms by virtue of a very sparse address space. We show that an intelligent worm can ex...
Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos ...
CHES
2005
Springer
149views Cryptology» more  CHES 2005»
14 years 2 months ago
Resistance of Randomized Projective Coordinates Against Power Analysis
Embedded devices implementing cryptographic services are the result of a trade-off between cost, performance and security. Aside from flaws in the protocols and the algorithms us...
William Dupuy, Sébastien Kunz-Jacques