Sciweavers

5 search results - page 1 / 1
» The homograph attack
Sort
View
INDOCRYPT
2010
Springer
13 years 2 months ago
Attack on a Higher-Order Masking of the AES Based on Homographic Functions
In the recent years, Higher-order Side Channel attacks have been widely investigated. In particular, 2nd-order DPA have been improved and successfully applied to break several mask...
Emmanuel Prouff, Thomas Roche
CACM
2002
63views more  CACM 2002»
13 years 4 months ago
The homograph attack
Evgeniy Gabrilovich, Alex Gontmakher
CSREASAM
2010
13 years 2 months ago
The 2010 IDN Homograph Attack Mitigation Survey
Peter Hannay, Christopher Bolan
FC
2007
Springer
111views Cryptology» more  FC 2007»
13 years 11 months ago
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks
Abstract. In this usability study of phishing attacks and browser antiphishing defenses, 27 users each classified 12 web sites as fraudulent or legitimate. By dividing these users...
Collin Jackson, Daniel R. Simon, Desney S. Tan, Ad...
AES
2004
Springer
139views Cryptology» more  AES 2004»
13 years 10 months ago
The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers
This paper is motivated by the design of AES. We consider a broader question of cryptanalysis of block ciphers having very good non-linearity and diffusion. Can we expect anyway, ...
Nicolas Courtois