Sciweavers

667 search results - page 6 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
ESORICS
2002
Springer
16 years 1 months ago
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense
It is believed that masking is an effective countermeasure against power analysis attacks: before a certain operation involving a key is performed in a cryptographic chip, the inpu...
Marcin Gomulkiewicz, Miroslaw Kutylowski
CCS
2007
ACM
15 years 8 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
139
Voted
CHES
2008
Springer
144views Cryptology» more  CHES 2008»
15 years 3 months ago
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs
Abstract. This paper proposes new chosen-message power-analysis attacks against public-key cryptosystems based on modular exponentiation, which use specific input pairs to generate...
Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Ak...
ICC
2009
IEEE
125views Communications» more  ICC 2009»
14 years 11 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto
ICCV
2009
IEEE
16 years 6 months ago
Video Scene Understanding Using Multi-scale Analysis
We propose a novel method for automatically discover-ing key motion patterns happening in a scene by observing the scene for an extended period. Our method does not rely on object ...
Yang Yang, Jingen Liu, Mubarak Shah