Sciweavers

196 search results - page 1 / 40
» Bit-Pattern Based Integral Attack
Sort
View
FSE
2008
Springer
100views Cryptology» more  FSE 2008»
13 years 6 months ago
Bit-Pattern Based Integral Attack
Muhammad Reza Z'aba, Håvard Raddum, Matthew ...
ITCC
2005
IEEE
13 years 10 months ago
A Scalable and High Performance Elliptic Curve Processor with Resistance to Timing Attacks
This paper presents a high performance and scalable elliptic curve processor which is designed to be resistant against timing attacks. The point multiplication algorithm (double-a...
Alireza Hodjat, David Hwang, Ingrid Verbauwhede
JOC
2011
104views more  JOC 2011»
12 years 8 months ago
On the Security of Oscillator-Based Random Number Generators
Physical random number generators (a.k.a. TRNGs) appear to be critical components of many cryptographic systems. Yet, such building blocks are still too seldom provided with a form...
Mathieu Baudet, David Lubicz, Julien Micolod, Andr...
CCS
2009
ACM
13 years 9 months ago
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks
Despite the many efforts made in recent years to mitigate runtime attacks such as stack and heap based buffer overflows, these attacks are still a common security concern in today...
Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy
SCN
2011
Springer
292views Communications» more  SCN 2011»
13 years 5 days ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...