Sciweavers

525 search results - page 13 / 105
» The Davies-Murphy Power Attack
Sort
View
TCOS
2010
13 years 4 months ago
Green Secure Processors: Towards Power-Efficient Secure Processor Design
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the softwar...
Siddhartha Chhabra, Yan Solihin
CHES
2006
Springer
111views Cryptology» more  CHES 2006»
14 years 1 months ago
Cache-Collision Timing Attacks Against AES
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
Joseph Bonneau, Ilya Mironov
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
12 years 9 months ago
Automatic Search of Attacks on Round-Reduced AES and Applications
In this paper, we describe versatile and powerful algorithms for searching guess-and-determine and meet-in-the-middle attacks on byte-oriented symmetric primitives. To demonstrate ...
Charles Bouillaguet, Patrick Derbez, Pierre-Alain ...
ISCAPDCS
2004
13 years 11 months ago
Detecting Grid-Abuse Attacks by Source-based Monitoring
While it provides the unprecedented processing power to solve many large scale computational problems, GRID, if abused, has the potential to easily be used to launch (for instance...
Jianjia Wu, Dan Cheng, Wei Zhao
GLOBECOM
2010
IEEE
13 years 7 months ago
Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks
We propose a spectrum decision protocol resilient to primary user emulation attacks (PUEA) in dynamic spectrum access networks. PUEA is a type of denial-of-service attack that can ...
Z. Jin, S. Anand, K. P. Subbalakshmi