Sciweavers

518 search results - page 51 / 104
» Abstract Interpretation-Based Protection
Sort
View
CHES
2007
Springer
122views Cryptology» more  CHES 2007»
15 years 8 months ago
Two New Techniques of Side-Channel Cryptanalysis
Abstract. We describe two new techniques of side-channel cryptanalysis which we call the impossible collision attack and the multiset collision attack. These are inspired by the st...
Alex Biryukov, Dmitry Khovratovich
GI
2007
Springer
15 years 8 months ago
Multisensor Based Generation of Templates for Object Tracking in Complex Scenarios
Abstract: Protection and surveillance of persons and facilities is frequently associated with automatic tracking of striking objects like vehicles or persons in an image sequence. ...
Carmen Witte, Klaus Jäger, Walter Armbruster,...
100
Voted
IWSEC
2007
Springer
15 years 8 months ago
Accredited Symmetrically Private Information Retrieval
Abstract. With the digitization of society and the continuous migration of services to the electronic world, individuals have lost significant control over their data. In this pap...
Mohamed Layouni
115
Voted
KIVS
2007
Springer
15 years 8 months ago
A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA)
Abstract Most SSL/TLS-based e-commerce applications employ conventional mechanisms for user authentication. These mechanisms—if decoupled from SSL/TLS session establishment—are...
Rolf Oppliger, Ralf Hauser, David A. Basin, Aldo R...
117
Voted
SACRYPT
2007
Springer
145views Cryptology» more  SACRYPT 2007»
15 years 8 months ago
Passive-Only Key Recovery Attacks on RC4
Abstract. We present several weaknesses in the key scheduling algorithm of RC4 when the secret key contains an initialization vector – a cryptographic scheme typically used by th...
Serge Vaudenay, Martin Vuagnoux