Sciweavers

704 search results - page 83 / 141
» A Practical Attack on KeeLoq
Sort
View
CHES
2010
Springer
166views Cryptology» more  CHES 2010»
15 years 29 days ago
Algebraic Side-Channel Analysis in the Presence of Errors
Measurement errors make power analysis attacks difficult to mount when only a single power trace is available: the statistical methods that make DPA attacks so successful are not a...
Yossef Oren, Mario Kirschbaum, Thomas Popp, Avisha...
CCS
2010
ACM
15 years 2 days ago
The security of modern password expiration: an algorithmic framework and empirical analysis
This paper presents the first large-scale study of the success of password expiration in meeting its intended purpose, namely revoking access to an account by an attacker who has ...
Yinqian Zhang, Fabian Monrose, Michael K. Reiter
INFOCOM
2006
IEEE
15 years 5 months ago
Session Privacy Enhancement by Traffic Dispersion
— Traditional network routing uses the single (shortest) path paradigm. This paradigm leaves the session vulnerable to a variety of security threats, such as eavesdropping. We pr...
Haim Zlatokrilov, Hanoch Levy
IASTEDSE
2004
15 years 1 months ago
Design and evaluation of birthmarks for detecting theft of java programs
200402.tex ABSTRACT To detect theft of Java class files efficiently, we have so far proposed a concept of Java birthmarks. Since the birthmarks are unique and native characteristic...
Haruaki Tamada, Masahide Nakamura, Akito Monden
CRYPTO
2009
Springer
119views Cryptology» more  CRYPTO 2009»
15 years 6 months ago
How Risky Is the Random-Oracle Model?
RSA-FDH and many other schemes secure in the Random-Oracle Model (ROM) require a hash function with output size larger than standard sizes. We show that the random-oracle instanti...
Gaëtan Leurent, Phong Q. Nguyen