Sciweavers

1769 search results - page 162 / 354
» Cryptography
Sort
View
91
Voted
FC
2009
Springer
93views Cryptology» more  FC 2009»
15 years 10 months ago
Detecting Denial of Service Attacks in Tor
Abstract. Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service base...
Norman Danner, Danny Krizanc, Marc Liberatore
FC
2009
Springer
121views Cryptology» more  FC 2009»
15 years 10 months ago
Achieving Privacy in a Federated Identity Management System
Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domai...
Susan Landau, Hubert Lê Van Gông, Robi...
FDTC
2009
Springer
104views Cryptology» more  FDTC 2009»
15 years 10 months ago
Low Voltage Fault Attacks on the RSA Cryptosystem
—Fault injection attacks are a powerful tool to exploit implementative weaknesses of robust cryptographic algorithms. The faults induced during the computation of the cryptograph...
Alessandro Barenghi, Guido Bertoni, Emanuele Parri...
FDTC
2009
Springer
100views Cryptology» more  FDTC 2009»
15 years 10 months ago
Using Optical Emission Analysis for Estimating Contribution to Power Analysis
—This paper shows that optical emissions from an operating chip have a good correlation with power traces and can therefore be used to estimate the contribution of different area...
Sergei P. Skorobogatov
IMA
2009
Springer
152views Cryptology» more  IMA 2009»
15 years 10 months ago
Double-Exponentiation in Factor-4 Groups and Its Applications
In previous work we showed how to compress certain prime-order subgroups of the cyclotomic subgroups of orders 22m + 1 of the multiplicative groups of F∗ 24m by a factor of 4. We...
Koray Karabina