Sciweavers

50 search results - page 8 / 10
» New Partial Key Exposure Attacks on RSA
Sort
View
CTRSA
2005
Springer
79views Cryptology» more  CTRSA 2005»
15 years 5 months ago
Malicious Cryptography: Kleptographic Aspects
Abstract. In the last few years we have concentrated our research efforts on new threats to the computing infrastructure that are the result of combining malicious software (malwar...
Adam Young, Moti Yung
CANS
2011
Springer
292views Cryptology» more  CANS 2011»
13 years 11 months ago
Breaking Fully-Homomorphic-Encryption Challenges
At EUROCRYPT ’10, van Dijk, Gentry, Halevi and Vaikuntanathan presented simple fully-homomorphic encryption (FHE) schemes based on the hardness of approximate integer common div...
Phong Q. Nguyen
ASIACRYPT
2003
Springer
15 years 4 months ago
The Insecurity of Esign in Practical Implementations
Provable security usually makes the assumption that a source of perfectly random and secret data is available. However, in practical applications, and especially when smart cards a...
Pierre-Alain Fouque, Nick Howgrave-Graham, Gwena&e...
IACR
2011
86views more  IACR 2011»
13 years 11 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
ADHOC
2007
109views more  ADHOC 2007»
14 years 11 months ago
Access control in wireless sensor networks
Nodes in a sensor network may be lost due to power exhaustion or malicious attacks. To extend the lifetime of the sensor network, new node deployment is necessary. In military sce...
Yun Zhou, Yanchao Zhang, Yuguang Fang