Sciweavers

1019 search results - page 16 / 204
» Cryptographic Design Vulnerabilities
Sort
View
SIGMETRICS
2006
ACM
116views Hardware» more  SIGMETRICS 2006»
15 years 3 months ago
Applying architectural vulnerability Analysis to hard faults in the microprocessor
In this paper, we present a new metric, Hard-Fault Architectural Vulnerability Factor (H-AVF), to allow designers to more effectively compare alternate hard-fault tolerance scheme...
Fred A. Bower, Derek Hower, Mahmut Yilmaz, Daniel ...
SBCCI
2006
ACM
124views VLSI» more  SBCCI 2006»
15 years 3 months ago
A cryptography core tolerant to DFA fault attacks
This work describes a hardware approach for the concurrent fault detection and error correction in a cryptographic core. It has been shown in the literature that transient faults ...
Carlos Roberto Moratelli, Érika F. Cota, Ma...
ARCS
2004
Springer
15 years 2 months ago
Modelling Cryptonite - On the Design of a Programmable High-Performance Crypto Processor
: Cryptographic algorithms – even when designed for easy implementability on general purpose architectures – still show a huge performance gap between implementations in softwa...
Rainer Buchty
DCC
2008
IEEE
15 years 9 months ago
Attacks on the RC4 stream cipher
In this article we present some weaknesses in the RC4 cipher and their cryptographic applications. Especially we improve the attack described in [2] in such a way, that it will wo...
Andreas Klein
IJSN
2007
82views more  IJSN 2007»
14 years 9 months ago
Vulnerabilities in distance-indexed IP traceback schemes
: In order to counter Denial-of-Service (DoS) attacks using spoofed source addresses, many IP traceback schemes have been proposed in the last few years. Among them, distanceindexe...
Jianping Pan, Lin Cai, Xuemin Shen