Sciweavers

15 search results - page 1 / 3
» A Unified Approach to Related-Key Attacks
Sort
View
FSE
2008
Springer
72views Cryptology» more  FSE 2008»
13 years 6 months ago
A Unified Approach to Related-Key Attacks
Eli Biham, Orr Dunkelman, Nathan Keller
INDOCRYPT
2007
Springer
13 years 11 months ago
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
The stream cipher TPypy has been designed by Biham and Seberry in January 2007 as the strongest member of the Py-family ciphers, after weaknesses in the other members Py, Pypy, Py...
Gautham Sekar, Souradyuti Paul, Bart Preneel
EUROCRYPT
2009
Springer
14 years 5 months ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...
CCR
2010
133views more  CCR 2010»
13 years 5 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
DEXAW
1999
IEEE
75views Database» more  DEXAW 1999»
13 years 9 months ago
Coordination of Security Levels for Internet Architectures
Internet systems provide a variety of ways to exchange information, contain large amounts and variety of data, and have become quite complex, making them vulnerable to attacks fro...
Eduardo B. Fernández