Results 261 to 270 of about 10,030,622 (339)
Some of the next articles are maybe not open access.
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer
IACR Cryptology ePrint Archive, 2022In this work, we recover the private key material of the FrodoKEM key exchange mechanism as submitted to the NIST Post Quantum Cryptography (PQC) standardization process.
Michael Fahr +10 more
semanticscholar +1 more source
Cryptographic Information Recovery Using Key Recovery
Computers & Security, 2000A note to readers: the authors consider that all techniques for key recovery may be viewed as having a position on a broad continuum. The only way to avoid misunderstanding is to identify particular techniques by listing their specific characteristics, rather than using multiply-defined terms.
Michael Smith +2 more
openaire +1 more source
Additional Key Recovery Functions
Computers & Security, 2000This document describes additional functions that may be required by specific implementations of the key recovery model. This document should not be read in isolation, but must be read in conjunction with the Key Recovery Functional Model document.
Stephen M. Matyas, Nevenko Zunic
openaire +1 more source
Trident: A Hybrid Correlation-Collision GPU Cache Timing Attack for AES Key Recovery
International Symposium on High-Performance Computer Architecture, 2021Given the parallel processing capabilities of Graphics Processing Units (GPUs), many applications are exploiting GPUs and cryptographic systems have also begun to leverage GPUs to accelerate encryption/decryption.
Jaeguk Ahn +6 more
semanticscholar +1 more source
ISAKMP Key Recovery Extensions
Computers & Security, 2000This document describes the proposed approach for negotiating and exchanging key recovery information within the Internet Security Association Key Management Protocol (ISAKMP).
David Balenson, Tom Markham
openaire +1 more source
Computers & Security, 2000
This document describes a model for key recovery. The means by which plaintext may be recovered or reconstructed from recovered key(s) is not addressed in the key recovery model. The key recovery model is a generalized model that encompasses a wide variety of key recovery systems, including both key backup and encapsulated key recovery information ...
John Kennedy +2 more
openaire +1 more source
This document describes a model for key recovery. The means by which plaintext may be recovered or reconstructed from recovered key(s) is not addressed in the key recovery model. The key recovery model is a generalized model that encompasses a wide variety of key recovery systems, including both key backup and encapsulated key recovery information ...
John Kennedy +2 more
openaire +1 more source
Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems, 2002
Internet/intranet security has witnessed an explosive and exciting growth in the past two years. Under the surface of excitement lies a mine of technical and commercial challenges. Without solving these challenges, secure systems will not reach their expected potential. Security can be achieved via encryption.
openaire +1 more source
Internet/intranet security has witnessed an explosive and exciting growth in the past two years. Under the surface of excitement lies a mine of technical and commercial challenges. Without solving these challenges, secure systems will not reach their expected potential. Security can be achieved via encryption.
openaire +1 more source
Key Recovery — Möglichkeiten und Risiken
Informatik-Spektrum, 1998Dieser Beitrag untersucht verschiedene Moglichkeiten zur Wiederherstellung verschlusselter Daten, ohne das ein direkter Zugriff auf den vom intendierten Nutzer zur Entschlusselung verwendeten Schlussel besteht, und vergleicht sie hinsichtlich ihrer sicherheitstechnischen Eigenschaften.
openaire +1 more source
Good-bye key escrow, hello key recovery
Computer Fraud & Security, 1996Abstract On 2 October 1996, IBM announced the formation of a new business alliance which will develop a different approach to law enforcement — accessible encryption that will not face government export controls or require the ‘escrowing’ of keys with either escrow ‘quote agents’ or trusted third parties.
openaire +1 more source

