Sciweavers

134 search results - page 11 / 27
» Attack for Flash MIX
Sort
View
FDTC
2009
Springer
100views Cryptology» more  FDTC 2009»
15 years 6 months ago
Using Optical Emission Analysis for Estimating Contribution to Power Analysis
—This paper shows that optical emissions from an operating chip have a good correlation with power traces and can therefore be used to estimate the contribution of different area...
Sergei P. Skorobogatov
125
Voted
ICC
2008
IEEE
121views Communications» more  ICC 2008»
15 years 6 months ago
Maximization of Network Survival Time in the Event of Intelligent and Malicious Attacks
—It is not possible to ensure that a network is absolutely secure. Therefore, network operators must continually change their defense strategies to counter attackers who constant...
Po-Hao Tsang, Frank Yeong-Sung Lin, Chun-Wei Chen
CIS
2008
Springer
15 years 1 months ago
A Near-Optimal Redundancy Allocation Strategy that Minimizes a System's Vulnerability to Hazardous Events and Malicious Attacks
Delivering continuous services in information infrastructures is a major challenge. For system or network administrators, redundancy allocation is one of the best strategies to en...
Frank Yeong-Sung Lin, Po-Hao Tsang, Kun-Dao Jiang
BROADNETS
2007
IEEE
15 years 6 months ago
Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution
— A Mobile Ad-Hoc Network (MANET) is considered with nodes that may act selfishly or maliciously by simply dropping data packets rather than forwarding them. We study a distribu...
Arnab Das 0002, George Kesidis, Venkat Pothamsetty
88
Voted
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
15 years 4 months ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux