Sciweavers

362 search results - page 5 / 73
» Extending the Resynchronization Attack
Sort
View
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
14 years 3 months ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...
62
Voted
HICSS
2003
IEEE
130views Biometrics» more  HICSS 2003»
15 years 5 months ago
Attack Recognition for System Survivability: A Low-level Approach
This paper extends and builds on previous work that presented a signature-based attack recognition technique. We present general requirements for “survivable attack recognition...
Carol Taylor, Jim Alves-Foss
ECAI
2010
Springer
15 years 23 days ago
Computation in Extended Argumentation Frameworks
Extended Argumentation Frameworks (EAFs) are a proposed formalism that develop abstract argumentation frameworks (AFs) by allowing attacks between arguments to be attacked themselv...
Paul E. Dunne, Sanjay Modgil, Trevor J. M. Bench-C...
83
Voted
FSE
2007
Springer
103views Cryptology» more  FSE 2007»
15 years 5 months ago
Improved Slide Attacks
Abstract. The slide attack is applicable to ciphers that can be represented as an iterative application of the same keyed permutation. The slide attack leverages simple attacks on ...
Eli Biham, Orr Dunkelman, Nathan Keller
81
Voted
EUROCRYPT
1990
Springer
15 years 3 months ago
A Known Plaintext Attack on Two-Key Triple Encryption
A chosen-plaintext attack on two-key triple encryption noted by Merkle and Hellman is extended to a known-plaintext attack. The known-plaintext attack has lower memory requirements...
Paul C. van Oorschot, Michael J. Wiener