|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8634 occurrences of 2564 keywords
|
|
|
Results
Found 25080 publication records. Showing 25080 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
25 | Jian-min Han, Ting-ting Cen, Huiqun Yu |
An Improved V-MDAV Algorithm for l-Diversity. |
ISIP |
2008 |
DBLP DOI BibTeX RDF |
Homogeneity Attack, Background Knowledge Attack, K-Anonymity, L-Diversity |
25 | Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo 0001, Huaxiong Wang |
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
LSBS-RSA, short exponent attack, lattice reduction technique, the Boneh-Durfee attack, RSA, least significant bits (LSBs) |
25 | María Naya-Plasencia |
Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
Achterbahn, cryptanalysis, stream cipher, correlation attack, eSTREAM, linear approximation, parity check, key-recovery attack |
25 | Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, Matt Bishop |
Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
Response Agent (RA), Topology Dependency Index (TDI), Attack Damage Index (ADI), adaptive isolation, attack damage, response cost, MANET |
25 | Deok Jin Kim, Tae-Hyung Kim, Jong Kim 0001, Sung Je Hong |
Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
Return Address, return-into-libc Attack, Data Injection Buffer Overflow Attack, Security, Randomization, Buffer Overflow, Instruction Set |
25 | Youngsook Lee, Junghyun Nam, Dongho Won |
Security Enhancement of a Remote User Authentication Scheme Using Smart Cards. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
parallel session attack, smart card, password, Authentication scheme, reflection attack |
25 | Hongjie He, Jiashu Zhang, Heng-Ming Tai |
A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication. |
IWDW |
2006 |
DBLP DOI BibTeX RDF |
the vector quantization attack, the transplantation attack, discrete wavelet transform (DWT), fragile watermarking |
25 | Donghoon Chang, Kishan Chand Gupta, Mridul Nandi |
RC4-Hash: A New Hash Function Based on RC4. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Hash Function, Collision Attack, RC4, Preimage Attack |
25 | Zhitang Li, Wei Guo, Fuquan Xu |
Dependable Propagating Routing Information in MANET. |
ICCNMC |
2005 |
DBLP DOI BibTeX RDF |
Passive Attack, Mobile Ad Hoc Networks, Active Attack, Secure Routing Protocol, Routing Discovery |
25 | Christophe Giraud 0001, Erik Woodward Knudsen |
Fault Attacks on Signature Schemes. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
XTR-DSA, Schnorr signature, Side-Channel Attack, Smartcard, Fault Attack, Signature schemes, DSA, ECDSA, ElGamal signature |
25 | JaeCheol Ha, Sang-Jae Moon |
Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
Side-channel attack, DPA, Elliptic curve cryptosystems, SPA, Power analysis attack, Non-adjacent form |
25 | Alex Biryukov, Eyal Kushilevitz |
From Differential Cryptanalysis to Ciphertext-Only Attacks. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
Madryga, RC5, ciphertext-only attack, differential-linear attack, block-ciphers, DES, differential cryptanalysis |
24 | Iftikhar Ahmad 0002, Azween B. Abdullah, Abdullah Sharaf Alghamdi |
Application of artificial neural network in detection of DOS attacks. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
internet control message protocol, multiple layered perceptron, resilient backpropagation, neural network, artificial neural network, false positive, dataset, false negative, detection rate, denial of service attack |
24 | Peter Ebinger, Malcolm Parsons |
Measuring the impact of attacks on the performance of mobile ad hoc networks. |
PE-WASUN |
2009 |
DBLP DOI BibTeX RDF |
performance evaluation, attack, performance metrics, manet, black hole |
24 | Kazumaro Aoki, Jian Guo 0001, Krystian Matusiewicz, Yu Sasaki, Lei Wang 0031 |
Preimages for Step-Reduced SHA-2. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
SHA-512, hash, preimage attack, meet-in-the-middle, SHA-256 |
24 | Ewan Fleischmann, Michael Gorski, Stefan Lucks |
Attacking 9 and 10 Rounds of AES-256. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
related-key boomerang attack, block ciphers, AES, differential cryptanalysis |
24 | Artemios G. Voyiatzis, Dimitrios N. Serpanos |
The security of the Fiat-Shamir scheme in the presence of transient hardware faults. |
ACM Trans. Embed. Comput. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Fiat-Shamir identification scheme, cryptography, side-channel attacks, smartcards, Bellcore attack |
24 | Marianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy S. El-Soudani |
Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Security, Ad Hoc Networks, Intrusion Detection, Wormhole Attack |
24 | Guang Gong |
Sequences, DFT and Resistance against Fast Algebraic Attacks. |
SETA |
2008 |
DBLP DOI BibTeX RDF |
fast algebraic attack, bases, trace representations, stream ciphers, Discrete Fourier transform, polynomials, LFSR, m-sequences |
24 | Yukiyasu Tsunoo, Teruo Saito, Maki Shigeri, Takeshi Kawabata |
Higher Order Differential Attacks on Reduced-Round MISTY1. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
CRYPTREC, higher order differential attack, MISTY1, block cipher, NESSIE |
24 | Florian Mendel, Vincent Rijmen |
Cryptanalysis of the Tiger Hash Function. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
pseudo-collision, pseudo-near-collision, Cryptanalysis, hash functions, collision, differential attack, near-collision |
24 | Hesiri Weerasinghe, Huirong Fu |
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
Cooperative Black Hole attack, MANET, AODV |
24 | Jongsung Kim, Seokhie Hong, Bart Preneel |
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Block Ciphers, AES, Related-Key Rectangle Attack |
24 | Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hideki Imai |
Algebraic Cryptanalysis of 58-Round SHA-1. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Gröbner basis, SHA-1, differential attack |
24 | Hwaseong Lee, Yong Ho Kim, Dong Hoon Lee 0001, Jongin Lim 0001 |
Classification of Key Management Schemes for Wireless Sensor Networks. |
APWeb/WAIM Workshops |
2007 |
DBLP DOI BibTeX RDF |
security, wireless sensor networks, key management, guideline, attack model |
24 | Jungwon Kim, Peter J. Bentley, Christian Wallenta, Mohamed Ahmed 0001, Stephen Hailes |
Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm. |
ICARIS |
2006 |
DBLP DOI BibTeX RDF |
Interest Cache Poisoning Attack, Sensor Networks, Artificial Immune Systems, Danger Theory |
24 | Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng Song Ngiam |
Effect of Malicious Synchronization. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
Distributed Denial of Service (DDoS) attacks, low rate DDoS attack, herding, synchronization, Network security, periodicity |
24 | Siho Kim, Keun-Sung Bae |
Analysis of Optimal Search Interval for Estimation of Modified Quantization Step Size in Quantization-Based Audio Watermark Detection. |
IWDW |
2006 |
DBLP DOI BibTeX RDF |
Amplitude scaling attack, Quantization-based, Quantization step size, Audio watermarking |
24 | John Kelsey, Stefan Lucks |
Collisions and Near-Collisions for Reduced-Round Tiger. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
hash function, attack, collisions, Tiger |
24 | Sultan Al-Hinai, Lynn Margaret Batten, Bernard D. Colbert, Kenneth Koon-Ho Wong |
Algebraic Attacks on Clock-Controlled Stream Ciphers. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
irregular clocking, stream cipher, linear feedback shift register, algebraic attack, clock control |
24 | Xiping He, Qingsheng Zhu, Ping Gu |
A New Chaos-Based Encryption Method for Color Image. |
RSKT |
2006 |
DBLP DOI BibTeX RDF |
ergodic matrix, encryption, attack, diffusion, S-box, confusion, Chaotic map |
24 | Eun-Jun Yoon, Kee-Young Yoo |
Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks. |
ICCSA (1) |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, Network security, Hash function, Password authentication, Diffie-Hellman, Stolen-verifier attack |
24 | Nong Ye, Toni Farley |
A Scientific Approach to Cyberattack Detection. |
Computer |
2005 |
DBLP DOI BibTeX RDF |
Cyberattack detection, Attack-norm separation, Signal detection models, Detection systems, Security and privacy |
24 | Eun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo |
Robust and Simple Authentication Protocol for Secure Communication on the Web. |
ICWE |
2005 |
DBLP DOI BibTeX RDF |
Denning-Sacco attack, Security, Authentication, Cryptography, Smart card, Key establishment, Forward Secrecy |
24 | Kris Tiri, David D. Hwang, Alireza Hodjat, Bo-Cheng Lai, Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhede |
A side-channel leakage free coprocessor IC in 0.18µm CMOS for embedded AES-based cryptographic and biometric processing. |
DAC |
2005 |
DBLP DOI BibTeX RDF |
security IC, encryption, smart card, side-channel attack, differential power analysis, countermeasure |
24 | Sung-Woon Lee, Hyun-Sung Kim 0001, Kee-Young Yoo |
Cryptanalysis of a user authentication scheme using hash functions. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
authentication, cryptography, hash function, password, guessing attack |
24 | Jinn-ke Jan, Yi-Hwa Chen |
A New Efficient MAKEP for Wireless Communications. |
AINA (2) |
2004 |
DBLP DOI BibTeX RDF |
Wireless network, key distribution, Key exchange, Mutual authentication, Man-in-the-middle attack |
24 | Jonathan J. Hoch, Adi Shamir |
Fault Analysis of Stream Ciphers. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
Lili-128, SOBER-t32, Stream cipher, LFSR, fault attack, RC4 |
24 | Colin D. Walter |
Longer Keys May Facilitate Side Channel Attacks. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Key Length, Side Channel Attacks, DPA, Power Analysis, Timing Attack, RSA Cryptosystem |
24 | Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone Vidmar |
Are E-Commerce Users Defenceless? |
IPDPS |
2003 |
DBLP DOI BibTeX RDF |
Run time modification, Security, E-commerce, Attack |
24 | Kouichi Sakurai, Tsuyoshi Takagi |
On the Security of a Modified Paillier Public-Key Primitive. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
One-wayness, Composite residuosity problem, Paillier cryptosystem, Factoring, Key distribution, Chosen ciphertext attack |
24 | Paul C. Kocher |
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
cryptanalysis, DSS, RSA, Timing attack, Diffie-Hellman |
24 | Paul C. van Oorschot, Michael J. Wiener |
Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
parallel collision search, low Hamming weight exponents, cryptanalysis, DES, Meet-in-the-middle attack |
24 | Raja Sekhar Reddy Gade, Hari Krishna Vellalacheruvu, Sanjeev Kumar |
Performance of Windows XP, Windows Vista and Apple's Leopard Computers under a Denial of Service Attack. |
ICDS |
2010 |
DBLP DOI BibTeX RDF |
Denial of Service (DoS) Attack, Internet Control Message Protocol (ICMP), Land Attack, Ping utility |
24 | Anmin Xie, Guodong Chen, Yonggang Wang, Zhong Chen 0001, Jian-bin Hu |
A New Method to Generate Attack Graphs. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
host access graph, sub-attack graph, network security, attack graphs |
23 | Xiaorui Sun, Xuejia Lai |
Improved Integral Attacks on MISTY1. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki |
Modeling Misuse Patterns. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer |
Rebound Distinguishers: Results on the Full Whirlpool Compression Function. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions, distinguisher, near-collision |
23 | Yu Sasaki, Kazumaro Aoki |
Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
RIPEMD, double branch, preimage, meet-in-the-middle |
23 | Lars R. Knudsen, Florian Mendel, Christian Rechberger, Søren S. Thomsen |
Cryptanalysis of MDC-2. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
MDC-2, hash function, collision, preimage |
23 | Sipat Triukose, Zakaria Al-Qudah, Michael Rabinovich |
Content Delivery Networks: Protection or Threat? |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Erik Tews, Martin Beck |
Practical attacks against WEP and WPA. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, 802.11, rc4, wep, wlan, wpa, tkip |
23 | Tao Zhang, Chong Wu |
Network Security Analysis Based on Security Status Space. |
WAIM |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Michael Kara-Ivaniov, Eran Iceland, Aviad Kipnis |
Attacks on Authentication and Signature Schemes Involving Corruption of Public Key (Modulus). |
FDTC |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Elie Bursztein |
Extending Anticipation Games with Location, Penalty and Timeline. |
Formal Aspects in Security and Trust |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay |
A Survey of Bots Used for Distributed Denial of Service Attacks. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Qingfeng Chen, Shichao Zhang 0001, Yi-Ping Phoebe Chen |
Identifying Dependency Between Secure Messages for Protocol Analysis. |
KSEM |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Mihui Kim, Jaewon Seo, Kijoon Chae |
Integrated Notification Architecture Based on Overlay Against DDoS Attacks on Convergence Network. |
SEUS |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Eli Biham, Orr Dunkelman, Nathan Keller |
Improved Slide Attacks. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe |
Generalized Correlation Analysis of Vectorial Boolean Functions. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Vectorial Boolean Functions, Unrestricted Nonlinearity, Resiliency |
23 | Hongli Luo, Mei-Ling Shyu |
Defense against Bandwidth Attacks with Traffic Resource Management. |
IRI |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Shishir Nagaraja, Ross J. Anderson |
Dynamic Topologies for Robust Scale-Free Networks. |
BIOWIRE |
2007 |
DBLP DOI BibTeX RDF |
covert groups, security, robustness, topology, Scale-free networks |
23 | Yih-Chun Hu, Adrian Perrig, David B. Johnson 0001 |
Wormhole attacks in wireless networks. |
IEEE J. Sel. Areas Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Shai Rubin, Somesh Jha, Barton P. Miller |
Protomatching network traffic for high throughputnetwork intrusion detection. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
intrusion detection, signatures, protocol analysis |
23 | Sherif M. Khattab, Daniel Mossé, Rami G. Melhem |
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks. |
IPDPS |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Wei Li 0025, Rayford B. Vaughn |
Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Kaoru Kurosawa, Swee-Huay Heng |
Relations Among Security Notions for Undeniable Signature Schemes. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
security notions, factoring assumption, composite decision Diffie-Hellman assumption, Undeniable signature |
23 | Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro |
Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andrew H. Sung |
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense). |
AINA (2) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Sanjeev Kumar, Montasir Azad, Orifiel Gomez, R. Valdez |
Can Microsoft's Service Pack2 (SP2) Security Software Prevent SMURF Attacks? |
AICT/ICIW |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai |
Some Remarks on Security of Receipt-Free E-auction. |
ICITA (2) |
2005 |
DBLP DOI BibTeX RDF |
Bid-rigging, Bid-collusion, security, Cryptography, Receipt-freeness, E-auction |
23 | Kazuhiro Ohno, Hideki Koike, Kanba Koizumi |
IPMatrix: An Effective Visualization Framework for Cyber Threat Monitoring. |
IV |
2005 |
DBLP DOI BibTeX RDF |
information visualization, intrusion detection, information security, Internet worm, computer virus |
23 | Eli Biham, Orr Dunkelman, Nathan Keller |
Related-Key Boomerang and Rectangle Attacks. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Wenling Wu, Wentao Zhang, Dengguo Feng |
Integral Cryptanalysis of Reduced FOX Block Cipher. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Chao-Yong Hsu, Chun-Shien Lu |
Near-perfect cover image recovery anti-multiple watermark embedding approaches. |
ISCAS (6) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Yi Shi, Xinyu Yang |
A Novel Architecture for Detecting and Defending Against Flooding-Based DDoS Attacks. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Lau Nga Sin, Moon-Chuen Lee |
An Efficient Domain Based Marking Scheme for IP Traceback. |
HSNMC |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Haibin Sun, John C. S. Lui, David K. Y. Yau |
Defending Against Low-Rate TCP Attacks: Dynamic Detection and Protection. |
ICNP |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P. S. Chan, Samuel T. Chanson, Matthew M. H. Cheung, C. F. Chong, Kam-Pui Chow, Albert K. T. Hui, Lucas Chi Kwong Hui, Luke C. K. Lam, W. C. Lau, Kevin K. H. Pun, Anthony Y. F. Tsang, Wai Wan Tsang, Sam C. W. Tso, Dit-Yan Yeung, Kwun Yin Yu |
IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks. |
ISPAN |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Dingbang Xu, Peng Ning |
Alert Correlation through Triggering Events and Common Resources. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Giampaolo Bella |
A Protocol's Life After Attacks... (Discussion). |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Paul Ammann, Duminda Wijesekera, Saket Kaushik |
Scalable, graph-based network vulnerability analysis. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
monotonic analysis, model checking, scalability, network security, vulnerability, exploit |
23 | Vladimir I. Gorodetski, Igor V. Kotenko |
Attacks Against Computer Network: Formal Grammar-Based Framework and Simulation Tool. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Eli Biham, Orr Dunkelman, Nathan Keller |
New Results on Boomerang and Rectangle Attacks. |
FSE |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng, Qin-Zhong Ye |
Improved Truncated Differential Attacks on SAFER. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Alejandro Hevia, Marcos A. Kiwi |
Strength of Two Data Encryption Standard Implementations under Timing Attacks. |
LATIN |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Jovan Dj. Golic, Luke O'Connor |
Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers. |
EUROCRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
23 | Michael J. Wiener |
Cryptanalysis of Short RSA Secret Exponents (Abstract). |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
23 | Andrew J. Clark |
Physical Protection of Cryptographic Devices. |
EUROCRYPT |
1987 |
DBLP DOI BibTeX RDF |
|
23 | Jiqiang Lu |
Related-key rectangle attack on 36 rounds of the XTEA block cipher. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
XTEA, Block cipher, Related-key rectangle attack |
23 | Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer |
Rebound Attack on the Full Lane Compression Function. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
LANE, rebound attack, semi-free-start collision, cryptanalysis, hash function, SHA-3 |
23 | Nan Wang, Lin Wang, Yanlong Bu, Guozhong Zhang, Lincheng Shen |
Tactical Aircraft Pop-Up Attack Planning Using Collaborative Optimization. |
ICIC (2) |
2009 |
DBLP DOI BibTeX RDF |
pop-up attack, weapon delivery, collaborative optimization, planning, law, response surface |
23 | John Dunagan, Alice X. Zheng, Daniel R. Simon |
Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs. |
SOSP |
2009 |
DBLP DOI BibTeX RDF |
identity snowball, machine learning, support vector machine, authentication, access control, combinatorial optimization, attack graph, sparsest cut |
23 | Kota Ideguchi, Dai Watanabe |
Second Preimage Attack on SHAMATA-512. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
SHAMATA, hash function, second preimage attack, SHA-3 candidate |
23 | Peng Zhang, Bing Sun 0001, Chao Li 0002 |
Saturation Attack on the Block Cipher HIGHT. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
HIGHT, Saturation attack, Block cipher, Distinguisher |
23 | Martin Hlavác |
Known-Plaintext-Only Attack on RSA-CRT with Montgomery Multiplication. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
Montgomery exponentiation, electronic passport, RSA, side channel attack, Chinese Remainder Theorem, Hidden Number Problem |
23 | Haina Zhang, Lin Li, Xiaoyun Wang 0001 |
Fast correlation attack on stream cipher ABC v3. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
ABC v3, cryptanalysis, stream cipher, fast correlation attack |
23 | Xiao Pan, Jianliang Xu, Xiaofeng Meng 0001 |
Protecting location privacy against location-dependent attack in mobile services. |
CIKM |
2008 |
DBLP DOI BibTeX RDF |
lbs, location-dependent attack, location privacy |
23 | Chetan Parampalli, R. Sekar 0001, Rob Johnson |
A practical mimicry attack against powerful system-call monitors. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
system-call monitor, intrusion-detection, buffer overflow, memory error, mimicry attack |
23 | Michael Gegick |
Failure-prone components are also attack-prone components. |
OOPSLA Companion |
2008 |
DBLP DOI BibTeX RDF |
attack-prone component |
Displaying result #401 - #500 of 25080 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|