Sciweavers

1294 search results - page 77 / 259
» Securing Against Insider Attacks
Sort
View
ACISP
2006
Springer
15 years 10 months ago
Distinguishing Attack on SOBER-128 with Linear Masking
Abstract. We present a distinguishing attack against SOBER-128 with linear masking. We found a linear approximation which has a bias of 2−8.8 for the non-linear filter. The atta...
Joo Yeon Cho, Josef Pieprzyk
FSE
1998
Springer
102views Cryptology» more  FSE 1998»
15 years 8 months ago
Cryptanalytic Attacks on Pseudorandom Number Generators
In this paper we discuss PRNGs: the mechanisms used by real-world secure systems to generate cryptographic keys, initialization vectors, "random" nonces, and other values...
John Kelsey, Bruce Schneier, David Wagner, Chris H...
CHES
2003
Springer
104views Cryptology» more  CHES 2003»
15 years 9 months ago
Power-Analysis Attacks on an FPGA - First Experimental Results
Field Programmable Gate Arrays (FPGAs) are becoming increasingly popular, especially for rapid prototyping. For implementations of cryptographic algorithms, not only the speed and ...
Siddika Berna Örs, Elisabeth Oswald, Bart Pre...
CRYPTO
2010
Springer
151views Cryptology» more  CRYPTO 2010»
15 years 5 months ago
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
Abstract. A cryptographic primitive is leakage-resilient, if it remains secure even if an adversary can learn a bounded amount of arbitrary information about the computation with e...
Yevgeniy Dodis, Krzysztof Pietrzak
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
15 years 8 months ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...