Sciweavers

1085 search results - page 121 / 217
» A Timing Attack on RC5
Sort
View
ISCAS
2003
IEEE
128views Hardware» more  ISCAS 2003»
15 years 3 months ago
Robust digital image-in-image watermarking algorithm using the fast Hadamard transform
In this paper, a robust and efficient digital image watermarking algorithm using the fast Hadamard transform (FHT) is proposed for the copyright protection of digital images. This...
Anthony Tung Shuen Ho, Jun Shen, A. K. K. Chow, J....
CRYPTO
2003
Springer
90views Cryptology» more  CRYPTO 2003»
15 years 3 months ago
Password Interception in a SSL/TLS Channel
Simple password authentication is often used e.g. from an email software application to a remote IMAP server. This is frequently done in a protected peer-to-peer tunnel, e.g. by SS...
Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Ma...
EUROCRYPT
2003
Springer
15 years 3 months ago
Cryptanalysis of the EMD Mode of Operation
Abstract. In this paper, we study the security of the Encrypt-MaskDecrypt mode of operation, also called EMD, which was recently proposed for applications such as disk-sector encry...
Antoine Joux
ACSAC
2002
IEEE
15 years 2 months ago
Evaluating the Impact of Automated Intrusion Response Mechanisms
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detect intrusions with a variety of methods. Unfortunately, system administrators ne...
Thomas Toth, Christopher Krügel
CCS
2009
ACM
15 years 1 months ago
On the difficulty of software-based attestation of embedded devices
Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be att...
Claude Castelluccia, Aurélien Francillon, D...