Sciweavers

373 search results - page 4 / 75
» Two Attacks on Reduced IDEA
Sort
View
ACISP
2008
Springer
14 years 1 months ago
Collisions for Round-Reduced LAKE
LAKE is a family of cryptographic hash functions presented at FSE 2008. It is an iterated hash function and defines two main instances with a 256 bit and 512 bit hash value. In th...
Florian Mendel, Martin Schläffer
DSD
2008
IEEE
108views Hardware» more  DSD 2008»
13 years 9 months ago
Reducing Leakage through Filter Cache
We evaluate the leakage reduction for both instruction and data cache in presence of drowsy or decay techniques. We discovered that a filter cache, traditionally used for reducing...
Roberto Giorgi, Paolo Bennati
CCS
2003
ACM
14 years 25 days ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
JCP
2007
127views more  JCP 2007»
13 years 7 months ago
Defending Cyberspace with Fake Honeypots
—Honeypots are computer systems designed for no purpose other than recording attacks on them. Cyberattackers should avoid them since honeypots jeopardize the secrecy of attack me...
Neil C. Rowe, E. John Custy, Binh T. Duong
CTRSA
2005
Springer
92views Cryptology» more  CTRSA 2005»
14 years 1 months ago
Update on SHA-1
Abstract. We report on the experiments we performed in order to assess the security of SHA-1 against the attack by Chabaud and Joux [5]. We present some ideas for optimizations of ...
Vincent Rijmen, Elisabeth Oswald