Sciweavers

704 search results - page 87 / 141
» A Practical Attack on KeeLoq
Sort
View
FLAIRS
2003
15 years 1 months ago
Meta-S: A Strategy-Oriented Meta-Solver Framework
Meta-S is a practical implementation and extension of the theoretical framework developed by Hofstedt, which allows the user to attack problems requiring the cooperation of arbitr...
Stephan Frank, Petra Hofstedt, Pierre R. Mai
CANS
2011
Springer
254views Cryptology» more  CANS 2011»
13 years 11 months ago
Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48
Abstract. In this paper we analyze the recently proposed light-weight block cipher PRINTCipher. Applying algebraic methods and SAT-solving we are able to break 8 rounds of PRINTCip...
Stanislav Bulygin, Johannes Buchmann
ICDE
2008
IEEE
110views Database» more  ICDE 2008»
16 years 1 months ago
InstantDB: Enforcing Timely Degradation of Sensitive Data
- People cannot prevent personal information from being collected by various actors. Several security measures are implemented on servers to minimize the possibility of a privacy v...
Nicolas Anciaux, Luc Bouganim, Harold van Heerde, ...
NDSS
2007
IEEE
15 years 6 months ago
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces
Encouraging the release of network data is central to promoting sound network research practices, though the publication of this data can leak sensitive information about the publ...
Scott E. Coull, Charles V. Wright, Fabian Monrose,...
ASIACRYPT
2010
Springer
14 years 10 months ago
A Closer Look at Anonymity and Robustness in Encryption Schemes
Abstract. In this work, we take a closer look at anonymity and robustness in encryption schemes. Roughly speaking, an anonymous encryption scheme hides the identity of the secret-k...
Payman Mohassel