Results 261 to 270 of about 10,030,622 (339)
Some of the next articles are maybe not open access.

When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer

IACR Cryptology ePrint Archive, 2022
In this work, we recover the private key material of the FrodoKEM key exchange mechanism as submitted to the NIST Post Quantum Cryptography (PQC) standardization process.
Michael Fahr   +10 more
semanticscholar   +1 more source

Cryptographic Information Recovery Using Key Recovery

Computers & Security, 2000
A note to readers: the authors consider that all techniques for key recovery may be viewed as having a position on a broad continuum. The only way to avoid misunderstanding is to identify particular techniques by listing their specific characteristics, rather than using multiply-defined terms.
Michael Smith   +2 more
openaire   +1 more source

Additional Key Recovery Functions

Computers & Security, 2000
This document describes additional functions that may be required by specific implementations of the key recovery model. This document should not be read in isolation, but must be read in conjunction with the Key Recovery Functional Model document.
Stephen M. Matyas, Nevenko Zunic
openaire   +1 more source

Trident: A Hybrid Correlation-Collision GPU Cache Timing Attack for AES Key Recovery

International Symposium on High-Performance Computer Architecture, 2021
Given the parallel processing capabilities of Graphics Processing Units (GPUs), many applications are exploiting GPUs and cryptographic systems have also begun to leverage GPUs to accelerate encryption/decryption.
Jaeguk Ahn   +6 more
semanticscholar   +1 more source

ISAKMP Key Recovery Extensions

Computers & Security, 2000
This document describes the proposed approach for negotiating and exchanging key recovery information within the Internet Security Association Key Management Protocol (ISAKMP).
David Balenson, Tom Markham
openaire   +1 more source

Key Recovery Functional Model

Computers & Security, 2000
This document describes a model for key recovery. The means by which plaintext may be recovered or reconstructed from recovered key(s) is not addressed in the key recovery model. The key recovery model is a generalized model that encompasses a wide variety of key recovery systems, including both key backup and encapsulated key recovery information ...
John Kennedy   +2 more
openaire   +1 more source

Cryptographic key recovery

Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems, 2002
Internet/intranet security has witnessed an explosive and exciting growth in the past two years. Under the surface of excitement lies a mine of technical and commercial challenges. Without solving these challenges, secure systems will not reach their expected potential. Security can be achieved via encryption.
openaire   +1 more source

Key Recovery — Möglichkeiten und Risiken

Informatik-Spektrum, 1998
Dieser Beitrag untersucht verschiedene Moglichkeiten zur Wiederherstellung verschlusselter Daten, ohne das ein direkter Zugriff auf den vom intendierten Nutzer zur Entschlusselung verwendeten Schlussel besteht, und vergleicht sie hinsichtlich ihrer sicherheitstechnischen Eigenschaften.
openaire   +1 more source

Good-bye key escrow, hello key recovery

Computer Fraud & Security, 1996
Abstract On 2 October 1996, IBM announced the formation of a new business alliance which will develop a different approach to law enforcement — accessible encryption that will not face government export controls or require the ‘escrowing’ of keys with either escrow ‘quote agents’ or trusted third parties.
openaire   +1 more source

Home - About - Disclaimer - Privacy