Please use this identifier to cite or link to this item:
https://ptsldigital.ukm.my/jspui/handle/123456789/395092
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Uwe Dippel | - |
dc.contributor.author | Salman Yussof | - |
dc.date.accessioned | 2023-06-15T07:54:59Z | - |
dc.date.available | 2023-06-15T07:54:59Z | - |
dc.identifier.other | ukmvital:122950 | - |
dc.identifier.uri | https://ptsldigital.ukm.my/jspui/handle/123456789/395092 | - |
dc.description.abstract | A relatively recent class of cryptographic attacks has evolved during the last years, focusing on the circumvention of cryptographic means by attacking other than the enciphering means itself. We call this class unencumbered, because the cryptanalysis is achieved without breaking the cipher. The attacker will instead observe the resources of the system at the deciphering process (or its failure). From this observation of the resources used, she will conclude the key being processed at successful deciphering or authentication. In the case of a plaintext attack, the message can be retrieved without breaking the cipher itself. We will introduce the current state of research in this field, some measures to avoid such attacks, and outline our ongoing research to combat such attacks in a more systematic manner. | - |
dc.language.iso | eng | - |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE),Piscataway, US | - |
dc.subject | Unencumbered cryptographic | - |
dc.subject | Cryptographic attacks | - |
dc.title | Overview of attacks on unencumbered cryptographic means and their prevention ac" can the circle be squared?" | - |
dc.type | Seminar Papers | - |
dc.format.pages | 5 | - |
dc.identifier.callno | T58.5.C634 2008 kat sem j.3 | - |
dc.contributor.conferencename | International Symposium on Information Technology | - |
dc.coverage.conferencelocation | Kuala Lumpur Convention Centre | - |
dc.date.conferencedate | 26/08/2008 | - |
Appears in Collections: | Seminar Papers/ Proceedings / Kertas Kerja Seminar/ Prosiding |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.