Sciweavers

1369 search results - page 51 / 274
» A Practical Implementation of the Timing Attack
Sort
View
ICSE
2007
IEEE-ACM
15 years 11 months ago
POLUS: A POwerful Live Updating System
This paper presents POLUS, a software maintenance tool capable of iteratively evolving running software into newer versions. POLUS's primary goal is to increase the dependabi...
Haibo Chen, Jie Yu, Rong Chen, Binyu Zang, Pen-Chu...
IEEEARES
2009
IEEE
15 years 5 months ago
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring
—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are able to compromise the entire system, placing it under malicious control, while eluding...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
92
Voted
SDMW
2005
Springer
15 years 4 months ago
Experiments with Queries over Encrypted Data Using Secret Sharing
To avoid insider attacks one cannot rely on access control to protect a database scheme. Encrypting the database is a better option. This paper describes a working prototype of an ...
Richard Brinkman, Berry Schoenmakers, Jeroen Doume...
97
Voted
PKC
2001
Springer
111views Cryptology» more  PKC 2001»
15 years 3 months ago
Cryptanalysis of PKP: A New Approach
Quite recently, in [4], a new time-memory tradeoff algorithm was presented. The original goal of this algorithm was to count the number of points on an elliptic curve, however, th...
Éliane Jaulmes, Antoine Joux
PQCRYPTO
2010
298views Cryptology» more  PQCRYPTO 2010»
15 years 2 months ago
Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes
Abstract. In this paper a new structural attack on the McEliece/Niederreiter public key cryptosystem based on subcodes of generalized ReedSolomon codes proposed by Berger and Loidr...
Christian Wieschebrink