Sciweavers

923 search results - page 27 / 185
» Improved Slide Attacks
Sort
View
IEEEARES
2008
IEEE
15 years 6 months ago
Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols
Existing undecidability proofs of checking secrecy of cryptographic protocols have the limitations of not considering protocols common in literature, which are in the form of comm...
Zhiyao Liang, Rakesh M. Verma
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
15 years 5 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
FDTC
2010
Springer
124views Cryptology» more  FDTC 2010»
14 years 9 months ago
Optical Fault Masking Attacks
This paper introduces some new types of optical fault attacks called fault masking attacks. These attacks are aimed at disrupting of the normal memory operation through preventing ...
Sergei Skorobogatov
81
Voted
CORR
2010
Springer
131views Education» more  CORR 2010»
14 years 12 months ago
Multimode Control Attacks on Elections
In 1992, Bartholdi, Tovey, and Trick [1992] opened the study of control attacks on elections--attempts to improve the election outcome by such actions as adding/deleting candidate...
Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hem...
ICC
2008
IEEE
125views Communications» more  ICC 2008»
15 years 6 months ago
Combining Speak-Up with DefCOM for Improved DDoS Defense
—This work combines two existing defenses against distributed denial-of-service (DDoS) attacks DefCOM and Speak-up resulting in a synergistic improvement. DefCOM defense organize...
Mohit Mehta, Kanika Thapar, George C. Oikonomou, J...