Sciweavers

525 search results - page 17 / 105
» The Davies-Murphy Power Attack
Sort
View
JCS
2011
72views more  JCS 2011»
13 years 4 months ago
Automatically deriving information-theoretic bounds for adaptive side-channel attacks
We present a model of adaptive attacks which we combine with information-theoretic metrics to quantify the information revealed to an adaptive adversary. This enables us to expres...
Boris Köpf, David A. Basin
ERSHOV
2006
Springer
14 years 1 months ago
Information-Flow Attacks Based on Limited Observations
Abstract. Two formal models for description of timing attacks are presented, studied and compared with other security concepts. The models are based on a timed process algebra and ...
Damas P. Gruska
TIP
2002
94views more  TIP 2002»
13 years 9 months ago
Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector
Watermarkingwith both obliviousdetection and high robustness capabilities is still a challenging problem. The existing methods are either robust or oblivious, but it is di cult to...
Chun-Shien Lu, Hong-Yuan Mark Liao, Martin Kutter
NDSS
1997
IEEE
14 years 2 months ago
Probable Plaintext Cryptanalysis of the IP Security Protocols
The Internet Engineering Task Force (IETF) is in the process of adopting standards for IP-layer encryption and authentication (IPSEC). We describe how “probable plaintext” can...
Steven M. Bellovin
FSE
1999
Springer
89views Cryptology» more  FSE 1999»
14 years 2 months ago
Slide Attacks
Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a high degree of self-similari...
Alex Biryukov, David Wagner