Sciweavers

704 search results - page 86 / 141
» A Practical Attack on KeeLoq
Sort
View
NOMS
2008
IEEE
15 years 6 months ago
Towards malware inspired management frameworks
Abstract—Scalability is a real challenge for network management due to the increase of the devices to be managed and their various locations. A potential solution is based on bot...
Jérôme François, Radu State, O...
ANTS
2004
Springer
121views Algorithms» more  ANTS 2004»
15 years 5 months ago
Function Field Sieve in Characteristic Three
In this paper we investigate the efficiency of the function field sieve to compute discrete logarithms in the finite fields F3n . Motivated by attacks on identity based encrypti...
Robert Granger, Andrew J. Holt, Dan Page, Nigel P....
INDOCRYPT
2003
Springer
15 years 5 months ago
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator
The RC4 stream cipher is the most widely used software based stream cipher. It is based on a secret internal state of N = 256 bytes and two pointers. This paper proposes an efficie...
Souradyuti Paul, Bart Preneel
EUROCRYPT
2001
Springer
15 years 4 months ago
A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures
Abstract. Known practical blind signature schemes whose security against adaptive and parallel attacks can be proven in the random oracle model either need five data exchanges bet...
Masayuki Abe
ANSS
2000
IEEE
15 years 4 months ago
Using the DEVS Paradigm to Implement a Simulated Processor
This work is devoted to present the design and implementation of Alfa-1, a simulated computer with educational purposes. The DEVS formalism was used to attack the complexity of th...
Sergio Daicz, Alejandro Troccoli, Sergio Zlotnik, ...