Sciweavers

1085 search results - page 29 / 217
» A Timing Attack on RC5
Sort
View
ACSAC
2010
IEEE
14 years 7 months ago
Multi-vendor penetration testing in the advanced metering infrastructure
- The advanced metering infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI "smart meters" report real time usage data that enables efficient energy...
Stephen E. McLaughlin, Dmitry Podkuiko, Sergei Mia...
JCP
2007
127views more  JCP 2007»
14 years 9 months ago
Defending Cyberspace with Fake Honeypots
—Honeypots are computer systems designed for no purpose other than recording attacks on them. Cyberattackers should avoid them since honeypots jeopardize the secrecy of attack me...
Neil C. Rowe, E. John Custy, Binh T. Duong
CTRSA
2006
Springer
129views Cryptology» more  CTRSA 2006»
15 years 1 months ago
Related-Key Impossible Differential Attacks on 8-Round AES-192
In this paper we examine the strength of AES against the related-key impossible differential attack, following the work of Jakimoski and Desmedt [12]. We use several additional obs...
Eli Biham, Orr Dunkelman, Nathan Keller
ASIACRYPT
2000
Springer
15 years 1 months ago
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers
In 1980 Hellman introduced a general technique for breaking arbitrary block ciphers with N possible keys in time T and memory M related by the tradeoff curve TM2 = N2 for 1 T N. ...
Alex Biryukov, Adi Shamir
71
Voted
MIG
2009
Springer
15 years 4 months ago
Real-Time Character Control for Wrestling Games
This paper proposes a method to simulate the real-time interactions of tangling motions by two virtual wrestlers in 3D computer games. The characters are controlled individually by...
Edmond S. L. Ho, Taku Komura