منابع مشابه
A First-Order DPA Attack Against AES in Counter Mode with Unknown Initial Counter
Previous first-order differential power analysis (DPA) attacks have depended on knowledge of the target algorithm’s input or output. This paper describes a first-order DPA attack against AES in counter mode, in which the initial counter and output values are all unknown.
متن کاملA Counter Based Approach for Mitigation of Grayhole Attack in VANETs: Comparison and Analysis
Vehicular Ad-hoc Networks (VANETs) are highly dynamic network and prone to many kinds of attacks. One class of attacks known as routing misbehavior targets the routing process of the networks. Grayhole attack is a malicious change in the routing process of effected nodes. Such node takes part in routing process but drops the packet when it is required to forward the packet to other nodes. This ...
متن کاملThe Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function
Streebog is a new Russian hash function standard. It follows the HAIFA framework as domain extension algorithm and claims to resist recent generic second-preimage attacks with long messages. However, we demonstrate in this article that the specific instantiation of the HAIFA framework used in Streebog makes it weak against such attacks. More precisely, we observe that Streebog makes a rather po...
متن کاملCounter Attack on Byzantine Generals: Parameterized Model Checking of Fault-tolerant Distributed Algorithms
We introduce an automated parameterized verification method for fault-tolerant distributed algorithms (FTDA). FTDAs are parameterized by both the number of processes and the assumed maximum number of Byzantine faulty processes. At the center of our technique is a parametric interval abstraction (PIA) where the interval boundaries are arithmetic expressions over parameters. Using PIA for both da...
متن کاملCounter Attack against Free-Riders: Filling a Security Hole in Bittorrent Protocol
eer-to-Peer(P2P) networks are powerful distributed solutions which do not rely on external servers and gather required resources from their users. Therefor fairness is an important feature for designers of these networks. To have a fair network we always want to prevent free-riding. One of the most important file-sharing protocols in P2P is Bittorrent. What separates Bittorrent from other P2P p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Canadian Medical Association Journal
سال: 2006
ISSN: 0820-3946,1488-2329
DOI: 10.1503/cmaj.051546