Sciweavers

859 search results - page 79 / 172
» The Changing Face of Cryptography
Sort
View
SACRYPT
2009
Springer
155views Cryptology» more  SACRYPT 2009»
14 years 2 months ago
Practical Collisions for SHAMATA-256
In this paper, we present a collision attack on the SHA-3 submission SHAMATA. SHAMATA is a stream cipher-like hash function design with components of the AES, and it is one of the ...
Sebastiaan Indesteege, Florian Mendel, Bart Prenee...
DATE
2008
IEEE
89views Hardware» more  DATE 2008»
14 years 2 months ago
EPIC: Ending Piracy of Integrated Circuits
As semiconductor manufacturing requires greater capital investments, the use of contract foundries has grown dramatically, increasing exposure to mask theft and unauthorized exces...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
ICC
2007
IEEE
124views Communications» more  ICC 2007»
14 years 2 months ago
Countermeasure Uncooperative Behaviors with Dynamic Trust-Token in VANETs
− As one special case of the Mobile Ad Hoc Networks (MANETs), Vehicular Ad hoc Network (VANET) is featured for its extremely high mobility and constantly changing topology. As a ...
Zhou Wang, Chunxiao Chigan
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
14 years 1 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp
ACNS
2006
Springer
111views Cryptology» more  ACNS 2006»
14 years 1 months ago
Adaptive Detection of Local Scanners
Network attacks often employ scanning to locate vulnerable hosts and services. Fast and accurate detection of local scanners is key to containing an epidemic in its early stage. Ex...
Ahren Studer, Chenxi Wang