Sciweavers

1369 search results - page 82 / 274
» A Practical Implementation of the Timing Attack
Sort
View
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
15 years 9 months ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
ANSS
2001
IEEE
15 years 8 months ago
Models of Complex Physical Systems Using Cell-DEVS
We present the definition of diverse models of physical systems using the Cell-DEVS paradigm. Cell-DEVS is an extension of the DEVS formalism that allows the definition of cellula...
Javier Ameghino, Alejandro Troccoli, Gabriel A. Wa...
ASIACRYPT
2003
Springer
15 years 10 months ago
Cryptanalysis of 3-Pass HAVAL
HAVAL is a cryptographic hash function proposed in 1992 by Zheng, Pieprzyk and Seberry. Its has a structure that is quite similar to other well-known hash functions such as MD4 and...
Bart Van Rompay, Alex Biryukov, Bart Preneel, Joos...
ASIACRYPT
1998
Springer
15 years 9 months ago
Analysis Methods for (Alleged) RC4
Abstract. The security of the alleged RC4 stream cipher and some variants is investigated. Cryptanalytic algorithms are developed for a known plaintext attack where only a small se...
Lars R. Knudsen, Willi Meier, Bart Preneel, Vincen...
MOBISYS
2006
ACM
16 years 4 months ago
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
The majority of security schemes available for sensor networks assume deployment in areas without access to a wired infrastructure. More specifically, nodes in these networks are ...
Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guo...