Sciweavers

525 search results - page 27 / 105
» The Davies-Murphy Power Attack
Sort
View
AAECC
2006
Springer
114views Algorithms» more  AAECC 2006»
14 years 3 months ago
Traitor Tracing Against Powerful Attacks Using Combinatorial Designs
This paper addresses the problem of threshold traitor tracing for digital content where, by embedding appropriate digital patterns into the distributed content, it is possible to t...
Simon McNicol, Serdar Boztas, Asha Rao
GLOBECOM
2009
IEEE
14 years 4 months ago
Optimal Power Allocation Strategy Against Jamming Attacks Using the Colonel Blotto Game
Abstract—Cognitive radio technologies have become a promising approach to increase the efficiency of spectrum utilization. Although cognitive radio has been intensively studied ...
Yongle Wu, Beibei Wang, K. J. Ray Liu
EUROCRYPT
2007
Springer
14 years 4 months ago
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
Abstract. Multiparty signature protocols need protection against roguekey attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, p...
Thomas Ristenpart, Scott Yilek
ASIACRYPT
2009
Springer
14 years 4 months ago
Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much?
We look at iterated power generators si = se i−1 mod N for a random seed s0 ∈ ZN that in each iteration output a certain amount of bits. We show that heuristically an output of...
Mathias Herrmann, Alexander May
CHES
2007
Springer
101views Cryptology» more  CHES 2007»
14 years 4 months ago
Power and EM Attacks on Passive 13.56 MHz RFID Devices
Michael Hutter, Stefan Mangard, Martin Feldhofer