نتایج جستجو برای: timing attacks

تعداد نتایج: 142928  

2012
Jung-Hui Chiu

This research study and analyse the various attacks RFID card on Mifare's disadvantage and safety concerns crux of the problem. The key recovery attack method depends on a plaintext-ciphertext pair on the existing relationship, as well as the secret parameters of the pseudo random number for use of the timing inappropriate. We proposed a scheme to improve the mechanisms for authentication, no a...

2014
Michael Weiß Benjamin Weggenmann Moritz August Georg Sigl

Virtualization has become one of the most important security enhancing techniques for embedded systems during the last years, both for mobile devices and cyber-physical system (CPS). One of the major security threats in this context is posed by side channel attacks. In this work, Bernstein’s time-driven cache-based attack against AES is revisited in a virtualization scenario based on an actual ...

1996
Paul C. Kocher

By carefully measuring the amount of time required to perform private key operations, attackers may be able to nd xed Di eHellman exponents, factor RSA keys, and break other cryptosystems. Against a vulnerable system, the attack is computationally inexpensive and often requires only known ciphertext. Actual systems are potentially at risk, including cryptographic tokens, network-based cryptosys...

2003
David Galindo Sebastià Martín Molleví Paz Morillo Jorge Luis Villar

At Crypto’99, Fujisaki and Okamoto [8] presented a nice generic transformation from weak asymmetric and symmetric schemes into an IND-CCA hybrid encryption scheme in the Random Oracle Model. Two specific candidates for standardization were designed from this transformation: PSEC-2 [14] and EPOC-2 [7], based on El Gamal and OkamotoUchiyama primitives, respectively. Since then, several cryptanaly...

2017
Gergely Acs

Information-Centric Networking (ICN) is an emerging networking paradigm where named and routable data (content) is the focal point. Users send explicit requests (interests) which specify content by name, and the network handles routing these interests to some entity capable of satisfying them with the appropriate data response (producer). One key feature of ICN is opportunistic in-network conte...

2015
Barbara J. Bentz Celia Boone Kenneth F. Raffa

1 Mountain pine beetle (Dendroctonus ponderosae) is an important disturbance agent in Pinus ecosystems of western North America, historically causing significant tree mortality. Most recorded outbreaks have occurred in mid elevation lodgepole pine (Pinus contorta). In warm years, tree mortality also occurs at higher elevations in mixed species stands. 2 Mountain pine beetle’s relative preferenc...

1999
Paul C. Kocher

By carefully measuring the amount of time required to perform private key operations, attackers may be able to nd xed Di eHellman exponents, factor RSA keys, and break other cryptosystems. Against a vulnerable system, the attack is computationally inexpensive and often requires only known ciphertext. Actual systems are potentially at risk, including cryptographic tokens, network-based cryptosys...

Journal: :Terrorism and Political Violence 2023

This paper analyzes Malay-Muslim insurgents’ attacks in the three southern provinces of Thailand between years 2010–2021 and identifies role public holidays on level violence. The existing literature suggests terrorists consider during attack planning. However, there is a lack agreement effect direction. Some studies have found that are force for peace while others they can act as trigger more ...

Journal: :Fundam. Inform. 2006
Damas P. Gruska

A formal model for an analysis of an information flow in interconnection networks is presented. It is based on timed process algebra which can express also network properties. The information flow is based on a concept of deducibility on composition. Robustness of systems against network timing attacks is defined. A variety of different security properties which reflect different security requi...

2006
Damas P. Gruska

Two formal models for description of timing attacks are presented, studied and compared with other security concepts. The models are based on a timed process algebra and on a concept of observations which make visible only a part of a system behaviour. An intruder tries to deduce some private system activities from this partial information which contains also timing of actions. To obtain realis...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید