Sciweavers

1085 search results - page 52 / 217
» A Timing Attack on RC5
Sort
View
FSE
2009
Springer
106views Cryptology» more  FSE 2009»
15 years 10 months ago
Practical Collisions for EnRUPT
The EnRUPT hash functions were proposed by O'Neil, Nohl and Henzen [5] as candidates for the SHA-3 competition, organised by NIST [4]. The proposal contains seven concrete has...
Sebastiaan Indesteege, Bart Preneel
DELTA
2008
IEEE
15 years 4 months ago
An Integrated Validation Environment for Differential Power Analysis
Integrated systems represent the most common solution for storage and transmission of confidential data. However, cryptographic devices can be subject to passive attacks that cons...
Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouze...
AES
2004
Springer
190views Cryptology» more  AES 2004»
15 years 3 months ago
Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results
Abstract. When cryptosystems are being used in real life, hardware and software implementations themselves present a fruitful field for attacks. Side channel attacks exploit infor...
Elena Trichina, Tymur Korkishko, Kyung-Hee Lee
WSC
2007
15 years 2 days ago
Modeling bioterrorism preparedness with simulation in rural healthcare system
As a result of the anthrax letter incidents in 2001, concerns about terrorists’ use of biological agents have increased dramatically at government state and federal levels. The ...
Lisa Patvivatsiri, Elliot J. Montes Jr., Ouyang Xi
MOBIHOC
2005
ACM
15 years 9 months ago
The feasibility of launching and detecting jamming attacks in wireless networks
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitt...
Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wo...