Sciweavers

1085 search results - page 58 / 217
» A Timing Attack on RC5
Sort
View
CHES
2008
Springer
135views Cryptology» more  CHES 2008»
14 years 11 months ago
Multiple-Differential Side-Channel Collision Attacks on AES
In this paper, two efficient multiple-differential methods to detect collisions in the presence of strong noise are proposed - binary and ternary voting. After collisions have been...
Andrey Bogdanov
CHES
2010
Springer
210views Cryptology» more  CHES 2010»
14 years 11 months ago
Flash Memory 'Bumping' Attacks
This paper introduces a new class of optical fault injection attacks called bumping attacks. These attacks are aimed at data extraction from secure embedded memory, which usually s...
Sergei Skorobogatov
ACNS
2006
Springer
87views Cryptology» more  ACNS 2006»
15 years 1 months ago
Effect of Malicious Synchronization
Abstract. We study the impact of malicious synchronization on computer systems that serve customers periodically. Systems supporting automatic periodic updates are common in web se...
Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng So...
BIRTHDAY
2005
Springer
15 years 3 months ago
Time for Thinking Big in AI
Abstract. The paper reminds of the vision behind Intellectics, the discipline of Arti cial Intelligence (AI) and Cognitive Science, and argues that the time has come for attacking ...
Wolfgang Bibel
RAID
2004
Springer
15 years 3 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem