Sciweavers

1085 search results - page 31 / 217
» A Timing Attack on RC5
Sort
View
70
Voted
FSE
2007
Springer
250views Cryptology» more  FSE 2007»
15 years 3 months ago
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
This paper examines the security of AES-192 and AES-256 against a related-key rectangle attack. We find the following new attacks: 8-round reduced AES-192 with 2 related keys, 10-...
Jongsung Kim, Seokhie Hong, Bart Preneel
DATE
2005
IEEE
115views Hardware» more  DATE 2005»
15 years 3 months ago
Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach
— A novel power attack resistant cryptosystem is presented in this paper. Security in digital computing and communication is becoming increasingly important. Design techniques th...
Shengqi Yang, Wayne Wolf, Narayanan Vijaykrishnan,...
64
Voted
ITCC
2005
IEEE
15 years 3 months ago
CompChall: Addressing Password Guessing Attacks
Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online...
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
CORR
2008
Springer
85views Education» more  CORR 2008»
14 years 9 months ago
Quantifying Timing Leaks and Cost Optimisation
We develop a new notion of security against timing attacks where the attacker is able to simultaneously observe the execution time of a program and the probability of the values of...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
IPL
2010
180views more  IPL 2010»
14 years 7 months ago
The effects of the omission of last round's MixColumns on AES
The Advanced Encryption Standard (AES) is the most widely deployed block cipher. It follows the modern iterated block cipher approach, iterating a simple round function multiple ti...
Orr Dunkelman, Nathan Keller