Sciweavers

133 search results - page 2 / 27
» Reduced Complexity Attacks on the Alternating Step Generator
Sort
View
EUROCRYPT
1994
Springer
13 years 10 months ago
The Self-Shrinking Generator
The self-shrinking generator was introduced in 1994. It is based on the idea behind the shrinking generator and despite its simplicity it has remained remarkably resistant to effic...
Willi Meier, Othmar Staffelbach
CRYPTO
2004
Springer
120views Cryptology» more  CRYPTO 2004»
13 years 11 months ago
Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers
Recently proposed algebraic attacks [2, 6] and fast algebraic attacks [1, 5] have provided the best analyses against some deployed LFSR-based ciphers. The process complexity is exp...
Philip Hawkes, Gregory G. Rose
INFORMATICASI
2010
13 years 3 months ago
Planning to Discover and Counteract Attacks
Recognizing attack plans is one of the goals of security analysts. Attack plan recognition is critical for predicting future actions of attackers, generating possible actions (i.e...
Tatiana Kichkaylo, Tatyana Ryutov, Michael D. Oros...
ICDE
2007
IEEE
113views Database» more  ICDE 2007»
14 years 7 months ago
Reducing Order Enforcement Cost in Complex Query Plans
Algorithms that exploit sort orders are widely used to implement joins, grouping, duplicate elimination and other set operations. Query optimizers traditionally deal with sort ord...
Ravindra Guravannavar, S. Sudarshan
ICISC
2007
117views Cryptology» more  ICISC 2007»
13 years 7 months ago
Side Channel Attacks on Irregularly Decimated Generators
Abstract. We investigate three side channel attacks on ABSG, a variant of irregularly decimated generators (IDG). The three attacks are timing analysis, phase-shift fault analysis ...
Chuan-Wen Loe, Khoongming Khoo