Sciweavers

1085 search results - page 30 / 217
» A Timing Attack on RC5
Sort
View
ICC
2008
IEEE
125views Communications» more  ICC 2008»
15 years 4 months ago
Real-Time, Byzantine-Tolerant Information Dissemination in Unreliable and Untrustworthy Distributed Systems
—In unreliable and untrustworthy systems, information dissemination may suffer network failures and attacks from Byzantine nodes which are controlled by traitors or adversaries, ...
Kai Han, Guanhong Pei, Binoy Ravindran, E. Douglas...
CJ
1998
63views more  CJ 1998»
14 years 9 months ago
Protecting IT Systems from Cyber Crime
Large-scale commercial, industrial and financial operations are becoming ever more interdependent, and ever more dependent on IT. At the same time, the rapidly growing interconnec...
R. Benjamin, B. Gladman, Brian Randell
SOCIALCOM
2010
14 years 7 months ago
Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis
As the value of reputation systems is widely recognized, the incentive to manipulate such systems is rapidly growing. We propose TAUCA, a scheme that identifies malicious users and...
Yuhong Liu, Yan (Lindsay) Sun
100
Voted
CRYPTO
2011
Springer
179views Cryptology» more  CRYPTO 2011»
13 years 9 months ago
Smaller Decoding Exponents: Ball-Collision Decoding
Very few public-key cryptosystems are known that can encrypt and decrypt in time b2+o(1) with conjectured security level 2b against conventional computers and quantum computers. Th...
Daniel J. Bernstein, Tanja Lange, Christiane Peter...
ICISC
2007
117views Cryptology» more  ICISC 2007»
14 years 11 months ago
Side Channel Attacks on Irregularly Decimated Generators
Abstract. We investigate three side channel attacks on ABSG, a variant of irregularly decimated generators (IDG). The three attacks are timing analysis, phase-shift fault analysis ...
Chuan-Wen Loe, Khoongming Khoo