Sciweavers

1294 search results - page 31 / 259
» Securing Against Insider Attacks
Sort
View
IEEEARES
2007
IEEE
14 years 2 months ago
Attacks are Protocols Too
In this paper we show how to simulate attacks on authentication protocols in a realistic environment. The attack on the Needham-Schroeder public key protocol found by Gavin Lowe i...
Anders Moen Hagalisletto
ISCAS
2005
IEEE
129views Hardware» more  ISCAS 2005»
14 years 2 months ago
Cryptanalysis of a multistage encryption system
— This paper analyzes the security of a new multistage encryption system (MES) recently proposed in ISCAS’2004. It is found that MES is insecure against a differential chosenpl...
Chengqing Li, Xinxiao Li, Shujun Li, Guanrong Chen
FDTC
2009
Springer
191views Cryptology» more  FDTC 2009»
14 years 3 months ago
Protecting RSA against Fault Attacks: The Embedding Method
—Fault attacks constitute a major threat toward cryptographic products supporting RSA-based technologies. Most often, the public exponent is unknown, turning resistance to fault ...
Marc Joye
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 8 months ago
An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks
Abstract. Relay attacks are a major concern for RFID systems: during an authentication process an adversary transparently relays messages between a verifier and a remote legitimate...
Gildas Avoine, Aslan Tchamkerten
FSE
1999
Springer
101views Cryptology» more  FSE 1999»
14 years 24 days ago
Mod n Cryptanalysis, with Applications Against RC5P and M6
We introduce “mod n cryptanalysis,” a form of partitioning attack that is effective against ciphers which rely on modular addition and bit rotations for their security. We dem...
John Kelsey, Bruce Schneier, David Wagner