Sciweavers

1019 search results - page 73 / 204
» Cryptographic Design Vulnerabilities
Sort
View

Publication
117views
15 years 4 days ago
Design, Implementation, and Performance Analysis of DiscoSec–Service Pack for Securing WLANs
To improve the already tarnished reputation of WLAN security, the new IEEE 802.11i security standard provides means for an enhanced user authentication and strong data confidential...
Ivan Martinovic, Paul Pichota, Matthias Wilhelm, F...
CSREASAM
2003
15 years 5 months ago
Assessing Power Substation Network Security and Survivability: A Work in Progress Report
This paper reports our experiences with identifying cyber-based threats to the survivability of power substation control networks. Observations from the initial application of vul...
Carol Taylor, Paul W. Oman, Axel W. Krings
IJNSEC
2006
66views more  IJNSEC 2006»
15 years 4 months ago
On the Security of Signature Scheme with Message Recovery and Its Application
In 2004, Sekhar proposed a new signature scheme with message recovery. Based on this signature scheme with message recovery, they also proposed a designated verifier signature sch...
Eun-Jun Yoon, Kee-Young Yoo
DAC
2004
ACM
15 years 7 months ago
An SoC design methodology using FPGAs and embedded microprocessors
In System on Chip (SoC) design, growing design complexity has esigners to start designs at higher abstraction levels. This paper proposes an SoC design methodology that makes full...
Nobuyuki Ohba, Kohji Takano
CASES
2010
ACM
15 years 2 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont