Sciweavers

1085 search results - page 111 / 217
» A Timing Attack on RC5
Sort
View
DAC
2008
ACM
14 years 11 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
COMPSAC
2006
IEEE
15 years 4 months ago
A Software Architectural Approach to Security by Design
This paper shows how an architecture description notation that has support for timed events can be used to provide a meta-language for specifying exact communication semantics. Th...
Arnab Ray, Rance Cleaveland
SPW
2004
Springer
15 years 3 months ago
Limits to Anonymity When Using Credentials
This paper identifies certain privacy threats that apply to anonymous credential systems. The focus is on timing attacks that apply even if the system is cryptographically secure....
Andreas Pashalidis, Chris J. Mitchell
CMMR
2005
Springer
143views Music» more  CMMR 2005»
14 years 12 months ago
The BRASS Project, from Physical Models to Virtual Musical Instruments: Playability Issues
The Brass project aims to deliver software virtual musical instruments (trumpet, trombone, tenor saxophone) based on physical modelling. This requires to work on some aspects of th...
Christophe Vergez, Patrice Tisserand
CORR
2008
Springer
133views Education» more  CORR 2008»
14 years 10 months ago
A New Stream Cipher: Dicing
: In this paper, we will propose a new synchronous stream cipher named DICING, which can be taken as a clock-controlled one but with a new mechanism of altering steps. With the sim...
An-Ping Li