Sciweavers

1369 search results - page 81 / 274
» A Practical Implementation of the Timing Attack
Sort
View
EUROCRYPT
2007
Springer
15 years 2 months ago
Cryptanalysis of SFLASH with Slightly Modified Parameters
SFLASH is a signature scheme which belongs to a family of multivariate schemes proposed by Patarin et al. in 1998 [9]. The SFLASH scheme itself has been designed in 2001 [8] and ha...
Vivien Dubois, Pierre-Alain Fouque, Jacques Stern
ASIACRYPT
2006
Springer
15 years 2 months ago
KFC - The Krazy Feistel Cipher
We introduce KFC, a block cipher based on a three round Feistel scheme. Each of the three round functions has an SPN-like structure for which we can either compute or bound the adv...
Thomas Baignères, Matthieu Finiasz
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
15 years 4 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
ISW
2007
Springer
15 years 5 months ago
Queue Management as a DoS Counter-Measure?
In this paper, we study the performance of timeout-based queue management practices in the context of flood denial-of-service (DoS) attacks on connection-oriented protocols, where...
Daniel Boteanu, José M. Fernandez, John McH...
WINE
2005
Springer
179views Economy» more  WINE 2005»
15 years 4 months ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...