Sciweavers

1085 search results - page 72 / 217
» A Timing Attack on RC5
Sort
View
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
15 years 4 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
EUROCRYPT
2005
Springer
15 years 3 months ago
Predicting and Distinguishing Attacks on RC4 Keystream Generator
In this paper we analyze the statistical distribution of the keystream generator used by the stream ciphers RC4 and RC4A. Our first result is the discovery of statistical biases o...
Itsik Mantin
JSAC
2006
139views more  JSAC 2006»
14 years 9 months ago
ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks
Multihop wireless mesh networks (WMNs) are finding ever-growing acceptance as a viable and effective solution to ubiquitous broadband Internet access. This paper addresses the secu...
Yanchao Zhang, Yuguang Fang
ESA
2005
Springer
114views Algorithms» more  ESA 2005»
15 years 3 months ago
Making Chord Robust to Byzantine Attacks
Chord is a distributed hash table (DHT) that requires only O(logn) links per node and performs searches with latency and message cost O(logn), where n is the number of peers in the...
Amos Fiat, Jared Saia, Maxwell Young
DIMVA
2007
14 years 11 months ago
Protecting the Intranet Against "JavaScript Malware" and Related Attacks
The networking functionality of JavaScript is restricted by the Same Origin Policy (SOP). However, as the SOP applies on a document level, JavaScript still possesses certain functi...
Martin Johns, Justus Winter