Sciweavers

14 search results - page 3 / 3
» ima 2009
Sort
View
IMA
2009
Springer
221views Cryptology» more  IMA 2009»
13 years 11 months ago
Cache Timing Analysis of LFSR-Based Stream Ciphers
Cache timing attacks are a class of side-channel attacks that is applicable against certain software implementations. They have generated significant interest when demonstrated ag...
Gregor Leander, Erik Zenner, Philip Hawkes
IMA
2009
Springer
152views Cryptology» more  IMA 2009»
13 years 11 months ago
Codes as Modules over Skew Polynomial Rings
In previous works we considered codes defined as ideals of quotients of skew polynomial rings, so called Ore rings of automorphism type. In this paper we consider codes defined a...
Delphine Boucher, Felix Ulmer
IMA
2009
Springer
139views Cryptology» more  IMA 2009»
13 years 11 months ago
Security of Cyclic Double Block Length Hash Functions
Abstract. We provide the first proof of security for Abreast-DM, one of the oldest and most wellknown constructions for turning a block cipher with n-bit block length and 2n-bit k...
Ewan Fleischmann, Michael Gorski, Stefan Lucks
CCS
2009
ACM
13 years 9 months ago
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks
Despite the many efforts made in recent years to mitigate runtime attacks such as stack and heap based buffer overflows, these attacks are still a common security concern in today...
Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy